Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Ed Stoner
March 2016 - White Paper Malware Capability Development Patterns Respond to Defenses: Two Case Studies

Topics: Malware Analysis

Authors: Kyle O'Meara, Deana Shick, Jonathan Spring, Ed Stoner

In this paper, the authors describe their analysis of two case studies to outline the relationship between adversaries and network defenders.

July 2015 - White Paper CND Equities Strategy

Topics: Vulnerability Analysis, Network Situational Awareness

Authors: Jonathan Spring, Ed Stoner

In this paper, the authors discuss strategies for successful computer network defense (CND) based on considering the adversaries' responses.

April 2011 - White Paper Correlating Domain Registrations and DNS First Activity in General and for Malware

Topics: Network Situational Awareness

Authors: Leigh B. Metcalf, Jonathan Spring, Ed Stoner

In this paper, the authors describe a pattern in the amount of time it takes for that domain to be actively resolved on the Internet.

October 2010 - Presentation DNS Footprint of Malware

Topics: Network Situational Awareness

Authors: Ed Stoner

In this presentation, Ed Stoner shows how to identify malware's footprint in various domain name servers.

June 2010 - White Paper Finding Malicious Activity in Bulk DNS Data

Topics: Network Situational Awareness

Authors: Ed Stoner

In this paper, Ed Stoner describes techniques for detecting certain types of malicious traffic.

January 2010 - Presentation Network Flow Analysis Using SiLK (v1.1.3)

Topics: Network Situational Awareness

Authors: Ed Stoner

In this presentation, given at FloCon in January 2010, the authors describe how to use SiLK, a collection of traffic analysis tools developed by CERT.

January 2010 - Presentation DNS and Flow: Bulk DNS Analysis

Topics: Network Situational Awareness

Authors: Ed Stoner

In this presentation, Ed Stoner explores techniques to analyze DNS traffic and combine that analysis with flow analysis.

January 2000 - Technical Report State of the Practice of Intrusion Detection Technologies

Authors: Julia H. Allen, Alan M. Christie, William L. Fithen, John McHugh, Jed Pickel, Ed Stoner

This report provides an unbiasedassessment of publicly available ID technology. The report also outlines relevant issues for the research community as they formulate research directions and allocate funds.

October 1999 - Security Improvement Module Deploying Firewalls

Authors: William L. Fithen, Julia H. Allen, Ed Stoner

This document helps organizations improve the security of their networked computer systems by illustrating how to design and deploy a firewall.