Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Seth E. Webster is active.

Publication


Featured researches published by Seth E. Webster.


darpa information survivability conference and exposition | 2000

Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation

Richard P. Lippmann; David J. Fried; Isaac Graf; Joshua W. Haines; Kristopher R. Kendall; David McClung; Dan Weber; Seth E. Webster; Dan Wyschogrod; Robert K. Cunningham; Marc A. Zissman

An intrusion detection evaluation test bed was developed which generated normal traffic similar to that on a government site containing 100s of users on 1000s of hosts. More than 300 instances of 38 different automated attacks were launched against victim UNIX hosts in seven weeks of training data and two weeks of test data. Six research groups participated in a blind evaluation and results were analyzed for probe, denial-of-service (DoS) remote-to-local (R2L), and user to root (U2R) attacks. The best systems detected old attacks included in the training data, at moderate detection rates ranging from 63% to 93% at a false alarm rate of 10 false alarms per day. Detection rates were much worse for new and novel R2L and DoS attacks included only in the test data. The best systems failed to detect roughly half these new attacks which included damaging access to root-level privileges by remote users. These results suggest that further research should focus on developing techniques to find new attacks instead of extending existing rule-based approaches.


visualization for computer security | 2010

Visualizing attack graphs, reachability, and trust relationships with NAVIGATOR

Matthew Chu; Kyle Ingols; Richard P. Lippmann; Seth E. Webster; Stephen W. Boyer

A new tool named NAVIGATOR (Network Asset VIsualization: Graphs, ATtacks, Operational Recommendations) adds significant capabilities to earlier work in attack graph visualization. Using NAVIGATOR, users can visualize the effect of server-side, client-side, credential-based, and trust-based attacks. By varying the attacker model, NAVIGATOR can show the current state of the network as well as hypothetical future situations, allowing for advance planning. Furthermore, NAVIGATOR explicitly shows network topology, infrastructure devices, and host-level data while still conveying situational awareness of the network as a whole. This tool is implemented in Java and uses an existing C++ engine for reachability and attack graph calculations.


network computing and applications | 2006

Experience Using Active and Passive Mapping for Network Situational Awareness

Seth E. Webster; Richard P. Lippmann; Marc A. Zissman

Passive network mapping has often been proposed as an approach to maintain up-to-date information on networks between active scans. This paper presents a comparison of active and passive mapping on an operational network. On this network, active and passive tools found largely disjoint sets of services and the passive system took weeks to discover the last 15% of active services. Active and passive mapping tools provided different, not complimentary information. Deploying passive mapping on an enterprise network does not reduce the need for timely active scans due to non-overlapping coverage and potentially long discovery times


Scientific Programming | 1998

Evaluating intrusion detection systems: 1998 darpa off-line intrusion detection evaluation

Richard P. Lippmann; David J. Fried; Isaac Graf; Joshua W. Haines; Kristopher R. Kendall; David McClung; Daniel Weber; Seth E. Webster; Dan Wyschogrod; Robert K. Cunningham; Marc A. Zissman


annual computer security applications conference | 2009

Modeling Modern Network Attacks and Countermeasures Using Attack Graphs

Kyle Ingols; Matthew Chu; Richard P. Lippmann; Seth E. Webster; Stephen W. Boyer


recent advances in intrusion detection | 1999

Results of the DARPA 1998 offline intrusion detection evaluation

Richard P. Lippmann; Robert K. Cunningham; David J. Fried; Isaac Graf; Kris R. Kendall; Seth E. Webster; Marc A. Zissman


recent advances in intrusion detection | 1998

The 1998 DARPA/AFRL Off-line Intrusion Detection Evaluation

Richard P. Lippmann; Isaac Graf; Robert K. Cunningham; David J. Fried; Simson L. Garfinkel; A. S. Gorton; Kristopher R. Kendall; D. J. McClung; D. J. Weber; Seth E. Webster; Dan Wyschogrod; Marc A. Zissman


Archive | 1999

Evaluating Intrusion Detection Systems Without Attacking Your Friends: The 1998 DARPA Intrusion Detection Evaluation

Robert K. Cunningham; Richard P. Lippmann; David J. Fried; Simson L. Garfinkel; Isaac Graf; Kristopher R. Kendall; Seth E. Webster; Dan Wyschogrod; Marc A. Zissman


IAS | 2001

Detecting Low-Profile Probes and Novel Denial-of-Service Attacks

Raj Basu; Robert K. Cunningham; Seth E. Webster; Richard P. Lippmann


systems man and cybernetics | 2001

Detecting and displaying novel computer attacks with Macroscope

Robert K. Cunningham; Richard P. Lippmann; Seth E. Webster

Collaboration


Dive into the Seth E. Webster's collaboration.

Top Co-Authors

Avatar

Richard P. Lippmann

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Robert K. Cunningham

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Marc A. Zissman

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

David J. Fried

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Dan Wyschogrod

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Isaac Graf

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Kristopher R. Kendall

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

David McClung

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Joshua W. Haines

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Kyle Ingols

Massachusetts Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge