Ed Stoner
Software Engineering Institute
Publications by Ed Stoner
-
Machine Learning in Cybersecurity: A Guide
September 05, 2019 • Technical Report
Jonathan SpringJoshua FallonApril Galyardt
This report suggests seven key questions that managers and decision makers should ask about machine learning tools to effectively use those tools to solve cybersecurity problems.
read -
Malware Capability Development Patterns Respond to Defenses: Two Case Studies
March 07, 2016 • White Paper
Kyle O'MearaDeana ShickJonathan Spring
In this paper, the authors describe their analysis of two case studies to outline the relationship between adversaries and network defenders.
read -
CND Equities Strategy
July 22, 2015 • White Paper
Jonathan SpringEd Stoner
In this paper, the authors discuss strategies for successful computer network defense (CND) based on considering the adversaries' responses.
read -
Correlating Domain Registrations and DNS First Activity in General and for Malware
April 11, 2011 • White Paper
Leigh B. MetcalfJonathan SpringEd Stoner
In this paper, the authors describe a pattern in the amount of time it takes for that domain to be actively resolved on the Internet.
read -
DNS Footprint of Malware
October 13, 2010 • Presentation
Ed Stoner
In this presentation, Ed Stoner shows how to identify malware's footprint in various domain name servers.
read -
Finding Malicious Activity in Bulk DNS Data
June 24, 2010 • White Paper
Ed Stoner
In this paper, Ed Stoner describes techniques for detecting certain types of malicious traffic.
read -
Network Flow Analysis Using SiLK (v1.1.3)
January 11, 2010 • Presentation
Ed Stoner
In this presentation, given at FloCon in January 2010, the authors describe how to use SiLK, a collection of traffic analysis tools developed by CERT.
read -
DNS and Flow: Bulk DNS Analysis
January 11, 2010 • Presentation
Ed Stoner
In this presentation, Ed Stoner explores techniques to analyze DNS traffic and combine that analysis with flow analysis.
read -
State of the Practice of Intrusion Detection Technologies
January 01, 2000 • Technical Report
Julia H. AllenAlan M. ChristieWilliam L. Fithen
This report provides an unbiasedassessment of publicly available ID technology. The report also outlines relevant issues for the research community as they formulate research directions and allocate funds.
read -
Deploying Firewalls
October 01, 1999 • Security Improvement Module
William L. FithenJulia H. AllenEd Stoner
This document helps organizations improve the security of their networked computer systems by illustrating how to design and deploy a firewall.
read