Off-campus ETSU users: To download "Campus Only" theses, please use the following link to log in to our proxy server with your ETSU username and password.

Non-ETSU users: Please talk to your librarian about requesting this thesis through interlibrary loan.

Degree Name

MS (Master of Science)

Program

Computer and Information Science

Date of Award

5-2002

Committee Chair or Co-Chairs

Phillip E. Pfeiffer IV

Committee Members

Todd Richardson, M. Gene Bailey, John D. Chenoweth

Abstract

Academic institutes' networks, like commercial networks, have confidential and valuable information that attracts hackers. From 6 October 2000 to 29 March 2001, the authors collected data on possible attacks and probes against East Tennessee State University's campus network. The number of suspicious activities detected daily varied from 200,000 to more than 2,000,000, with ICMP-based attacks accounting for more than 81% of all attacks. While ICMP-based attacks were reasonably harmless, these activities as a whole depleted network bandwidth significantly. Severe attacks were detected daily. Port scans and host scans that involving 2 or more /24 subnets were detected every week. Attacks and probes were distributed throughout a typical day and week. Our research results suggested policy makers in academic institutions like ETSU should adopt standard measures to secure campus networks, including firewalls, intrusion detection systems, server management, and risk assessment.

Document Type

Thesis - restricted

Copyright

Copyright by the authors.

Share

COinS