Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

For reading experiences, plan to spend more time on your writeup. Please discuss

ID: 3731306 • Letter: F

Question

For reading experiences, plan to spend more time on your writeup. Please discuss what you got out of the readings, e.g., what you learned, what you found surprising, what was hard to understand. Please DO NOT summarize the readings; report on your experience instead!

You may propose to read groups of papers on other topics. For most, however, you should probably split your efforts between reading and implementation (e.g., read about a technology and then play with it).

Foundational Security Papers 1

Denning, An Intrusion-Detection Model (https://ieeexplore.ieee.org/abstract/document/1702202/ )(IEEE Transactions on Software Engineering, 1987)

Bellovin and Cheswick, Network Firewalls (http://dx.doi.org/10.1109/35.312843)(IEEE Communications Magazine, 1994) (proxy)

Explanation / Answer

The paper mentioned here seems to be about an Intrusion Detection Model.

The Intrusion detection model is basically created to check for intrusions and raise and alarm if required, there are various ways and technologies to implement this model from simple piezo resistive sensors to laser systems, although all of them serves the same application but the implementation depend on the requirement.