Skip to main content

Find us on

facebook youtube flickr twitter itunes u logo

 

Past Programs  

mechael youtube

Keynote: Securing IT in Healthcare: Part III
Patty Mechael
mHealth Alliance
May 16, 2013

 nilsen youtube

Keynote: SITH3, Technology-Enabled Remote Monitoring and Support
Wendy Nilsen
National Institutes of Health (NIH)
May 17, 2013

sith3 panel1 youtube

Intersection of mHealth and Behavioral Health
SITH3 Workshop, Panel 1
May 17, 2013

 

Newsletter 

ists newsletter summer 2012

 

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu

Transparent IDS Bridge

Project Summary

This aims at creating the equivalent of a ‘melting fuse’ for security in a network wire. The system is a machine with two network connections and can be placed on any network wire by simply cutting the wire in half and connecting both ends to the machine. The underlying technology uses an Ethernet Bridge combined with both an intrusion detection system and a firewall. Because the firewall is implemented on a bridge instead of on a router it will no longer be visible on the Internet, thus being immune to attacks. Basically each packet is copied back and forth through the machine until the IDS detects an attack signature. Then the firewall is instructed to block all the packets originating from the hostile address from that moment on. The IDS system is designed mainly to detect pre-attack probes coming from whatever part of the Internet. This system requires no maintenance.