Soumyo D. Moitra
Software Engineering Institute
Publications by Soumyo D. Moitra
-
Modeling the Active and Idle Durations of Network Hosts
January 12, 2015 • Presentation
Soumyo D. Moitra
In this presentation, Soumyo discusses the distributions of active and idle durations of network hosts using flow data.
read -
Analysis of Some Time-Series Metrics for Network Monitoring
January 13, 2014 • Presentation
Soumyo D. Moitra
In this presentation, Soumyo Moitra presents a method and metrics for network situational awareness.
read -
Situational Awareness Metrics from Flow and Other Data Sources
January 07, 2013 • Presentation
Soumyo D. Moitra
In this presentation, Soumyo Moitra describes the need for a more flexible set of metrics for establishing network situational awareness.
read -
New Statistical Measures for Network Security
December 12, 2012 • Presentation
Soumyo D. Moitra
In this presentation, Soumyo Moitra discusses how much protection to provide to a network and how to prioritize and allocate resources.
read -
Data Needs for Network Security Metrics: A Measure and Manage Approach
July 02, 2012 • Presentation
Soumyo D. Moitra
This article describes the data needed to plan network security, particularly related to acquiring and deploying network sensors systems.
read -
Monitoring Trends in Network Flow for Situational Awareness
January 09, 2012 • Presentation
Soumyo D. Moitra
In this presentation, Soumyo Moitra discusses the role that network monitoring plays in network security and network situational awareness.
read -
A Simulation Model for Managing Survivability of Networked Information Systems
December 01, 2000 • Technical Report
Soumyo D. MoitraSuresh Konda
In this 2000 report, we develop a model to evaluate the tradeoffs between the cost of defense mechanisms for networked systems and the resulting expected survivability after a network attack.
read -
The Survivability of Network Systems: An Empirical Analysis
December 01, 2000 • Technical Report
Soumyo D. MoitraSuresh Konda
This report, published in 2000, presents an extended analysis of CERT Coordination Center incidents data (from 1988 to 1995) and applies the results to simulate attacks and their impacts on network sites.
read