Scalable High-Assurance Technology for Detecting Compromised Host Computers
NAVAL RESEARCH LAB WASHINGTON DC INFORMATION TECHNOLOGY DIV
Pagination or Media Count:
Explosive improvements in commercial computer technology and tight budget constraints have driven the military to use commodity operating systems as the foundation for its latest information technology. Unfortunately, the ability of commodity operating systems to protect themselves has not greatly improved. Commodity systems are defined as those that are both widely available and widely used. As a result, it is difficult to build an information system that can protect military data according to its criticality and value. Additional technology is needed to strengthen the security infrastructure of military information systems. The problem we are addressing here is not one of nuisance attacks such as the viruses reported by the news media.
- Computer Programming and Software