skip to main content
10.1145/1920261.1920303acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Back to Berferd

Published:06 December 2010Publication History

ABSTRACT

It has been nearly twenty years since I published the Berferd paper. Much of it is quite outdated, reflecting the state of technology at the time. But it did touch a number of issues that have become quite important. I discuss some of the existing conditions around the time of the paper, and some of these issues.

References

  1. the month of php security. http://php-security.org/index.html, 2010.Google ScholarGoogle Scholar
  2. Steven M. Bellovin. There be dragons. In Proceedings of the Third Usenix Unix Security Symposium, pages 1--16, September 1992.Google ScholarGoogle Scholar
  3. Steven M. Bellovin. Packets found on an internet. Computer Communications Review, 23(3):26--31, July 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bill Cheswick and Steve Bellovin. Firewalls et sécurité Internet. Addison-Wesley France, 1996.Google ScholarGoogle Scholar
  5. Bill Cheswick, Hal Burch, and Steve Branigan. Mapping and visualizing the internet. In Usenix, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. William R. Cheswick. The design of a secure internet gateway. In Proc. Summer USENIX Conference, Anaheim, CA, June 1990.Google ScholarGoogle Scholar
  7. William R. Cheswick. An evening with Berferd, in which a cracker is lured, endured, and studied. In Proc. Winter USENIX Conference, pages 163--174, San Francisco, CA, January 1992.Google ScholarGoogle Scholar
  8. William R. Cheswick and Steven M. Bellovin. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley, Reading, MA, first edition. 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin. Firewalls and Internet Security; Repelling the Wily Hacker. Addison-Wesley, Reading, MA, second edition, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. F. Cohen. Computer viruses: theory and experiments. Comput. Secur., 6(1):22--35, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Fred Cohen. Depection toolkit, http://all.net/, 1998.Google ScholarGoogle Scholar
  12. Dorothy E. Denning and Peter J. Denning. Internet Besieged. Addison Wesley Professional, 1997.Google ScholarGoogle Scholar
  13. DoD trusted computer system evaluation criteria. DoD 5200.28-STD, DoD Computer Security Center, 1985.Google ScholarGoogle Scholar
  14. Tom Duff. Experience with viruses on UNIX systems. j-COMP-SYS, 2(2):155--171, Spring 1989.Google ScholarGoogle Scholar
  15. M. W. Eichin and J. A. Rochlis. With microscope and tweezers: An analysis of the Internet virus of november 1988. In Proc. IEEE Symposium on Research in Security and Privacy, pages 326--345, Oakland, CA, May 1989.Google ScholarGoogle ScholarCross RefCross Ref
  16. A. G. Fraser. Proc. icc. pages 20.1.1--20.1.3, June 1979.Google ScholarGoogle Scholar
  17. George Friedman. The stuxnet computer worm and the iranian nuclear program---stratfor. http://www.stratfor.com/analysis/20100924_stuxnet_computer_worm_and_iranian_nuclear_program, 2010.Google ScholarGoogle Scholar
  18. David Goldsmith and Michael Schiffman. Firewalking: A traceroute-like analysis of IP packet responses to determine gateway access control lists, 1998.Google ScholarGoogle Scholar
  19. Stephen J. Gould. Wonderful Life: The Burgess Shale and the Nature of History. W. W. Norton and Company, 1990.Google ScholarGoogle Scholar
  20. M. Handley, C. Kreibich, and V. Paxson. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. Proceedings of the USENIX Security Symposium, pages 115--131, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Paul A. Karger and Roger R. Schell. Multics security evaluation: Vulnerability analysis, Volume II. Technical Report ESD-TR-74-193, HQ Electronic Systems Division: Hanscom AFB, MA, June 1974.Google ScholarGoogle Scholar
  22. Douglas Maughan. The need for a national cybersecurity research and development agenda. Commun. ACM, 53(2):29--31, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Peter G. Neumann, Matt Bishop, Sean Peisert, and Marv Schaefer. Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy. In Proceedings of the 31st IEEE Symposium on Security and Privacy, Oakland/Berkeley, CA, May 16--19, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. David L. Presotto. Upas---a simpler approach to network mail. In USENIX Conference Proceedings, pages 533--538, Portland, OR, Summer 1985.Google ScholarGoogle Scholar
  25. J. H. Saltzer, D. P. Reed, and D. D. Clark. End-to-end arguments in system design. ACM Trans. Comput. Syst., 2(4):277--288, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems, 1975.Google ScholarGoogle Scholar
  27. Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson. Practical network support for ip traceback. pages 295--306, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Bruce Schneier. The stuxnet worm. http://www.schneier.com/blog/archives/2010/09/the_stuxnet_wor.html, 2010.Google ScholarGoogle Scholar
  29. Cliff Stoll. Stalking the wily hacker. Communications of the ACM, 31(5):484, May 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Back to Berferd

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ACSAC '10: Proceedings of the 26th Annual Computer Security Applications Conference
        December 2010
        419 pages
        ISBN:9781450301336
        DOI:10.1145/1920261

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 6 December 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate104of497submissions,21%
      • Article Metrics

        • Downloads (Last 12 months)2
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader