SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Wind River going up, up, up!

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Peter Church who wrote (8267)8/16/2000 5:14:11 PM
From: Steve Hursey   of 10309
 
Thank you once again for your fine work. I did as you suggested and re-read post 8000. Perhaps there is a hint in there as to the reason for A.B.'s disappearance. I've lifted the relevant section where he is discussing the use of I20 in NICs for intrusion detection:

"Just to make this absolutely clear, let me describe one I have been toying with intellectually. Erwin, please strike
this from your mind after reading it since the idea is proprietary with me, and please don't tell anyone else.

First some background. Traditional Intrusion Detection (ID) is host-based or network-based (i.e. in gateways or
other network devices). ID is signature-based (known virus DNA like "I Love You" in an email) or
anomaly-based (perhaps a configuration or execution file changed erroneously, or something else very subtle is
judged to be abnormal -- I'm leaving this vague on purpose, and also because there is a lot of very sophisticated
research on-going in this area.) You can imagine that every system administrator would prefer to detect an
intrusion before it reaches any host computer, thereby eliminating any chance of the virus defeating defenses on a
host computer. This means an efficient network-based detection scheme would be treasured by enterprises in
general and eCommerce sites in particular.

Network-based ID of either type generally is limited to pretty dumb stuff like firewalls. One reason for this is that
packets, being just pieces of messages, carry less information than a fully assembled message. Since an
off-loaded NIC assembles messages, it follows that the best place to conduct network-based detection would be
at an offloaded, intelligent NIC. By maintaining a constant software platform in all iLANs, the market for a
powerful, subtle ID vertical solution for iLANs would be huge. This observation is so obvious, so important, and
so practical to implement, that you can count on this application alone to drive the iLAN market."
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext