Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where David J. Fried is active.

Publication


Featured researches published by David J. Fried.


recent advances in intrusion detection | 2000

The 1999 DARPA off-line intrusion detection evaluation

Richard P. Lippmann; Joshua W. Haines; David J. Fried; Jonathan Korba; Kumar Das

An important goal of the ongoing DARPA intrusion detection evaluations is to promote development of intrusion detection systems that can detect stealthy attacks which might be launched by well-funded hostile nations or terrorists organizations. This goal can only be reached if such stealthy attacks are included in the DARPA evaluations. This report describes new and known approaches and strategies that were used to make attacks stealthy for the 1999 DARPA Intrusion Detection Evaluation. It explains why some attacks used in the initial 1998 evaluation were easy to detect, presents general guidelines that were followed for the 1999 evaluation, includes many examples of stealthy scripts, and includes perl and shell scripts that can be use to implement stealthy procedures.


darpa information survivability conference and exposition | 2000

Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation

Richard P. Lippmann; David J. Fried; Isaac Graf; Joshua W. Haines; Kristopher R. Kendall; David McClung; Dan Weber; Seth E. Webster; Dan Wyschogrod; Robert K. Cunningham; Marc A. Zissman

An intrusion detection evaluation test bed was developed which generated normal traffic similar to that on a government site containing 100s of users on 1000s of hosts. More than 300 instances of 38 different automated attacks were launched against victim UNIX hosts in seven weeks of training data and two weeks of test data. Six research groups participated in a blind evaluation and results were analyzed for probe, denial-of-service (DoS) remote-to-local (R2L), and user to root (U2R) attacks. The best systems detected old attacks included in the training data, at moderate detection rates ranging from 63% to 93% at a false alarm rate of 10 false alarms per day. Detection rates were much worse for new and novel R2L and DoS attacks included only in the test data. The best systems failed to detect roughly half these new attacks which included damaging access to root-level privileges by remote users. These results suggest that further research should focus on developing techniques to find new attacks instead of extending existing rule-based approaches.


recent advances in intrusion detection | 2000

Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation

Richard P. Lippmann; Joshua W. Haines; David J. Fried; Jonathan Korba; Kumar Das

Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. Three weeks of training and two weeks of test data were generated on a test bed that emulates a small government site. More than 200 instances of 58 attack types were launched against victim UNIX and Windows NT hosts. False alarm rates were low (less than 10 per day). Best detection was provided by network-based systems for old probe and old denial-of-service (DoS) attacks and by host-based systems for Solaris user-to-root (U2R) attacks. Best overall performance would have been provided by a combined system that used both host- and network-based intrusion detection. Detection accuracy was poor for previously unseen new, stealthy, and Windows NT attacks. Ten of the 58 attack types were completely missed by all systems. Systems missed attacks because protocols and TCP services were not analyzed at all or to the depth required, because signatures for old attacks did not generalize to new attacks, and because auditing was not available on all hosts.


ieee aerospace conference | 2002

LARIAT: Lincoln adaptable real-time information assurance testbed

Lee M. Rossey; Robert K. Cunningham; David J. Fried; Jesse C. Rabek; Richard P. Lippmann; Joshua W. Haines; Marc A. Zissman

The Lincoln adaptable real-time information assurance testbed, LARIAT, is an extension of the testbed created for DARPA 1998 and 1999 intrusion detection (ID) evaluations. LARIAT supports real-time, automated and quantitative evaluations of ID systems and other information assurance (IA) technologies. Components of LARIAT generate realistic background user traffic and real network attacks, verify attack success or failure, score ID system performance, and provide a graphical user interface for control and monitoring. Emphasis was placed on making LARIAT easy to adapt, configure and run without requiring a detailed understanding of the underlying complexity. LARIAT is currently being exercised at four sites and is undergoing continued development and refinement.


Scientific Programming | 1998

Evaluating intrusion detection systems: 1998 darpa off-line intrusion detection evaluation

Richard P. Lippmann; David J. Fried; Isaac Graf; Joshua W. Haines; Kristopher R. Kendall; David McClung; Daniel Weber; Seth E. Webster; Dan Wyschogrod; Robert K. Cunningham; Marc A. Zissman


Archive | 1999

Darpa intrusion detection system evaluation: design and procedures

Joshua W. Haines; Richard P. Lippmann; David J. Fried; Jonathan Korba; Kaushik Das


recent advances in intrusion detection | 1999

Results of the DARPA 1998 offline intrusion detection evaluation

Richard P. Lippmann; Robert K. Cunningham; David J. Fried; Isaac Graf; Kris R. Kendall; Seth E. Webster; Marc A. Zissman


recent advances in intrusion detection | 1998

The 1998 DARPA/AFRL Off-line Intrusion Detection Evaluation

Richard P. Lippmann; Isaac Graf; Robert K. Cunningham; David J. Fried; Simson L. Garfinkel; A. S. Gorton; Kristopher R. Kendall; D. J. McClung; D. J. Weber; Seth E. Webster; Dan Wyschogrod; Marc A. Zissman


Archive | 1999

Evaluating Intrusion Detection Systems Without Attacking Your Friends: The 1998 DARPA Intrusion Detection Evaluation

Robert K. Cunningham; Richard P. Lippmann; David J. Fried; Simson L. Garfinkel; Isaac Graf; Kristopher R. Kendall; Seth E. Webster; Dan Wyschogrod; Marc A. Zissman


Archive | 1988

MIT Lincoln Laboratory offline component of DARPA 1998 intrusion detection evaluation

Richard P. Lippmann; Robert K. Cunningham; David J. Fried; Simson L. Garfinkel; A. Samuel Gorton; Isaac Graf; Kristopher R. Kendall; David McClung; Douglas J. Weber; Sally Webster; Dan Wyschogrod; Marc A. Zissman

Collaboration


Dive into the David J. Fried's collaboration.

Top Co-Authors

Avatar

Richard P. Lippmann

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Marc A. Zissman

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Robert K. Cunningham

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Joshua W. Haines

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Isaac Graf

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Dan Wyschogrod

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Kristopher R. Kendall

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Jonathan Korba

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Seth E. Webster

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

David McClung

Massachusetts Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge