Wiretapping the Internet
dc.contributor.author | Antonelli, C.J. | en_US |
dc.contributor.author | Honeyman, P. | en_US |
dc.date.accessioned | 2014-07-18T18:11:55Z | |
dc.date.available | 2014-07-18T18:11:55Z | |
dc.date.issued | 2000-11 | en_US |
dc.identifier.citation | C. J. Antonelli and P. Honeyman, "Wiretapping the Internet," November 2000. [SPIE Conference on Enabling Technologies for Law Enforcement and Security, Boston (November 2000)] <http://hdl.handle.net/2027.42/107911> | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/107911 | |
dc.description.abstract | With network security threats and vulnerabilities increasing, solutions based on online detection remain attractive. A complete, durable record of all activity on a network can be used to evaluate and train intrusion detection algorithms, assist in responding to an intrusion in progress, and, if properly constructed, serve as evidence in legal proceedings. This paper describes the Advanced Packet Vault, a technology for creating such a record by collecting and securely storing all packets observed on a network, with a scalable architecture intended to support network speeds in excess of 100 Mbps. Encryption is used to preserve users' security and privacy, permitting selected traffic to be made available without revealing other traffic. The Vault implementation, based on Linux and OpenBSD, is open-source. A Vault attached to a heavily loaded 100 Mbps network must capture, process, and store about a terabyte each day, so we have to be very sensitive to the recurring cost of operation and the reliability issues of 24x7 operation. We must also be sensitive to the admissibility of information collected by the Vault in support of legal proceedings; the legal ramifications of operating a vault, particularly at a public institution; and the public perception of its use. | en_US |
dc.title | Wiretapping the Internet | en_US |
dc.type | Article | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.contributor.affiliationum | Center for Information Technology Integration | en_US |
dc.contributor.affiliationother | Center for Information Technology Integration | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/107911/1/citi-tr-00-9.pdf | |
dc.owningcollname | Electrical Engineering and Computer Science, Department of (EECS) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe its collections in a way that respects the people and communities who create, use, and are represented in them. We encourage you to Contact Us anonymously if you encounter harmful or problematic language in catalog records or finding aids. More information about our policies and practices is available at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.