Seth E. Webster
Massachusetts Institute of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Seth E. Webster.
darpa information survivability conference and exposition | 2000
Richard P. Lippmann; David J. Fried; Isaac Graf; Joshua W. Haines; Kristopher R. Kendall; David McClung; Dan Weber; Seth E. Webster; Dan Wyschogrod; Robert K. Cunningham; Marc A. Zissman
An intrusion detection evaluation test bed was developed which generated normal traffic similar to that on a government site containing 100s of users on 1000s of hosts. More than 300 instances of 38 different automated attacks were launched against victim UNIX hosts in seven weeks of training data and two weeks of test data. Six research groups participated in a blind evaluation and results were analyzed for probe, denial-of-service (DoS) remote-to-local (R2L), and user to root (U2R) attacks. The best systems detected old attacks included in the training data, at moderate detection rates ranging from 63% to 93% at a false alarm rate of 10 false alarms per day. Detection rates were much worse for new and novel R2L and DoS attacks included only in the test data. The best systems failed to detect roughly half these new attacks which included damaging access to root-level privileges by remote users. These results suggest that further research should focus on developing techniques to find new attacks instead of extending existing rule-based approaches.
visualization for computer security | 2010
Matthew Chu; Kyle Ingols; Richard P. Lippmann; Seth E. Webster; Stephen W. Boyer
A new tool named NAVIGATOR (Network Asset VIsualization: Graphs, ATtacks, Operational Recommendations) adds significant capabilities to earlier work in attack graph visualization. Using NAVIGATOR, users can visualize the effect of server-side, client-side, credential-based, and trust-based attacks. By varying the attacker model, NAVIGATOR can show the current state of the network as well as hypothetical future situations, allowing for advance planning. Furthermore, NAVIGATOR explicitly shows network topology, infrastructure devices, and host-level data while still conveying situational awareness of the network as a whole. This tool is implemented in Java and uses an existing C++ engine for reachability and attack graph calculations.
network computing and applications | 2006
Seth E. Webster; Richard P. Lippmann; Marc A. Zissman
Passive network mapping has often been proposed as an approach to maintain up-to-date information on networks between active scans. This paper presents a comparison of active and passive mapping on an operational network. On this network, active and passive tools found largely disjoint sets of services and the passive system took weeks to discover the last 15% of active services. Active and passive mapping tools provided different, not complimentary information. Deploying passive mapping on an enterprise network does not reduce the need for timely active scans due to non-overlapping coverage and potentially long discovery times
Scientific Programming | 1998
Richard P. Lippmann; David J. Fried; Isaac Graf; Joshua W. Haines; Kristopher R. Kendall; David McClung; Daniel Weber; Seth E. Webster; Dan Wyschogrod; Robert K. Cunningham; Marc A. Zissman
annual computer security applications conference | 2009
Kyle Ingols; Matthew Chu; Richard P. Lippmann; Seth E. Webster; Stephen W. Boyer
recent advances in intrusion detection | 1999
Richard P. Lippmann; Robert K. Cunningham; David J. Fried; Isaac Graf; Kris R. Kendall; Seth E. Webster; Marc A. Zissman
recent advances in intrusion detection | 1998
Richard P. Lippmann; Isaac Graf; Robert K. Cunningham; David J. Fried; Simson L. Garfinkel; A. S. Gorton; Kristopher R. Kendall; D. J. McClung; D. J. Weber; Seth E. Webster; Dan Wyschogrod; Marc A. Zissman
Archive | 1999
Robert K. Cunningham; Richard P. Lippmann; David J. Fried; Simson L. Garfinkel; Isaac Graf; Kristopher R. Kendall; Seth E. Webster; Dan Wyschogrod; Marc A. Zissman
IAS | 2001
Raj Basu; Robert K. Cunningham; Seth E. Webster; Richard P. Lippmann
systems man and cybernetics | 2001
Robert K. Cunningham; Richard P. Lippmann; Seth E. Webster