David J. Fried
Massachusetts Institute of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by David J. Fried.
recent advances in intrusion detection | 2000
Richard P. Lippmann; Joshua W. Haines; David J. Fried; Jonathan Korba; Kumar Das
An important goal of the ongoing DARPA intrusion detection evaluations is to promote development of intrusion detection systems that can detect stealthy attacks which might be launched by well-funded hostile nations or terrorists organizations. This goal can only be reached if such stealthy attacks are included in the DARPA evaluations. This report describes new and known approaches and strategies that were used to make attacks stealthy for the 1999 DARPA Intrusion Detection Evaluation. It explains why some attacks used in the initial 1998 evaluation were easy to detect, presents general guidelines that were followed for the 1999 evaluation, includes many examples of stealthy scripts, and includes perl and shell scripts that can be use to implement stealthy procedures.
darpa information survivability conference and exposition | 2000
Richard P. Lippmann; David J. Fried; Isaac Graf; Joshua W. Haines; Kristopher R. Kendall; David McClung; Dan Weber; Seth E. Webster; Dan Wyschogrod; Robert K. Cunningham; Marc A. Zissman
An intrusion detection evaluation test bed was developed which generated normal traffic similar to that on a government site containing 100s of users on 1000s of hosts. More than 300 instances of 38 different automated attacks were launched against victim UNIX hosts in seven weeks of training data and two weeks of test data. Six research groups participated in a blind evaluation and results were analyzed for probe, denial-of-service (DoS) remote-to-local (R2L), and user to root (U2R) attacks. The best systems detected old attacks included in the training data, at moderate detection rates ranging from 63% to 93% at a false alarm rate of 10 false alarms per day. Detection rates were much worse for new and novel R2L and DoS attacks included only in the test data. The best systems failed to detect roughly half these new attacks which included damaging access to root-level privileges by remote users. These results suggest that further research should focus on developing techniques to find new attacks instead of extending existing rule-based approaches.
recent advances in intrusion detection | 2000
Richard P. Lippmann; Joshua W. Haines; David J. Fried; Jonathan Korba; Kumar Das
Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. Three weeks of training and two weeks of test data were generated on a test bed that emulates a small government site. More than 200 instances of 58 attack types were launched against victim UNIX and Windows NT hosts. False alarm rates were low (less than 10 per day). Best detection was provided by network-based systems for old probe and old denial-of-service (DoS) attacks and by host-based systems for Solaris user-to-root (U2R) attacks. Best overall performance would have been provided by a combined system that used both host- and network-based intrusion detection. Detection accuracy was poor for previously unseen new, stealthy, and Windows NT attacks. Ten of the 58 attack types were completely missed by all systems. Systems missed attacks because protocols and TCP services were not analyzed at all or to the depth required, because signatures for old attacks did not generalize to new attacks, and because auditing was not available on all hosts.
ieee aerospace conference | 2002
Lee M. Rossey; Robert K. Cunningham; David J. Fried; Jesse C. Rabek; Richard P. Lippmann; Joshua W. Haines; Marc A. Zissman
The Lincoln adaptable real-time information assurance testbed, LARIAT, is an extension of the testbed created for DARPA 1998 and 1999 intrusion detection (ID) evaluations. LARIAT supports real-time, automated and quantitative evaluations of ID systems and other information assurance (IA) technologies. Components of LARIAT generate realistic background user traffic and real network attacks, verify attack success or failure, score ID system performance, and provide a graphical user interface for control and monitoring. Emphasis was placed on making LARIAT easy to adapt, configure and run without requiring a detailed understanding of the underlying complexity. LARIAT is currently being exercised at four sites and is undergoing continued development and refinement.
Scientific Programming | 1998
Richard P. Lippmann; David J. Fried; Isaac Graf; Joshua W. Haines; Kristopher R. Kendall; David McClung; Daniel Weber; Seth E. Webster; Dan Wyschogrod; Robert K. Cunningham; Marc A. Zissman
Archive | 1999
Joshua W. Haines; Richard P. Lippmann; David J. Fried; Jonathan Korba; Kaushik Das
recent advances in intrusion detection | 1999
Richard P. Lippmann; Robert K. Cunningham; David J. Fried; Isaac Graf; Kris R. Kendall; Seth E. Webster; Marc A. Zissman
recent advances in intrusion detection | 1998
Richard P. Lippmann; Isaac Graf; Robert K. Cunningham; David J. Fried; Simson L. Garfinkel; A. S. Gorton; Kristopher R. Kendall; D. J. McClung; D. J. Weber; Seth E. Webster; Dan Wyschogrod; Marc A. Zissman
Archive | 1999
Robert K. Cunningham; Richard P. Lippmann; David J. Fried; Simson L. Garfinkel; Isaac Graf; Kristopher R. Kendall; Seth E. Webster; Dan Wyschogrod; Marc A. Zissman
Archive | 1988
Richard P. Lippmann; Robert K. Cunningham; David J. Fried; Simson L. Garfinkel; A. Samuel Gorton; Isaac Graf; Kristopher R. Kendall; David McClung; Douglas J. Weber; Sally Webster; Dan Wyschogrod; Marc A. Zissman