ABSTRACT

Ensuring the integrity of computer networks, both in relation to security and with regard to the institutional life of the nation in general, is a growing concern. Security and defense networks, proprietary research, intellectual property, and data-based market mechanisms that depend on unimpeded and undistorted access can all be severely compromised by malicious intrusions. We need to ’nd the best way to protect these systems. In addition, we need techniques to detect security breaches.