Ron McLeod (Corporate Development Telecom Applications Research Alliance)
Corporate Development Telecom Applications Research Alliance
Publications by Ron McLeod (Corporate Development Telecom Applications Research Alliance)
-
Presenting Mongoose A New Approach to Traffic Capture
January 07, 2013 • Presentation
Ron McLeod (Corporate Development Telecom Applications Research Alliance)Ashraf Abu Abusharekh
In this presentation, the authors describe Mongoose, a tool for monitoring the activity of the network from outside the network.
read -
Traffic Clusters in Networks of Convenience
January 12, 2009 • Presentation
Ron McLeod (Corporate Development Telecom Applications Research Alliance)
In this presentation, the authors describe the Mission Diagnostic, applying it, and lessons learn in applying it.
read -
One Year of Peer to Peer
January 07, 2008 • Presentation
Ron McLeod (Corporate Development Telecom Applications Research Alliance)
In this presentation, Ron McLeod profiles the growth in peer-to-peer applications on a sample network and describes the increase in the diversity of traffic.
read -
A Traffic Analysis of a Small Private Network Compromised by an Online Gaming Host (Presentation)
October 10, 2006 • Presentation
Ron McLeod (Corporate Development Telecom Applications Research Alliance)
In this presentation, Ron McLeod describes the results of an analysis to investigate performance issues on a small private network.
read -
A Traffic Analysis of a Small Private Network Compromised by an Online Gaming Host (White Paper)
October 10, 2006 • White Paper
Ron McLeod (Corporate Development Telecom Applications Research Alliance)
In this paper, Ron McLeod describes a network traffic capture and analysis used to investigate network performance issues of a small private network.
read -
Anomaly Detection Through Blind Flow Analysis Inside a Local Network (Presentation)
October 10, 2006 • Presentation
Ron McLeod (Corporate Development Telecom Applications Research Alliance)Vagishwari Nagaonkar (Wipro Technologies)
In this presentation, the authors describe how hosts may be clustered into user workstations, servers, printers, and hosts compromised by worms.
read -
Anomaly Detection Through Blind Flow Analysis Inside a Local Network (White Paper)
October 02, 2006 • White Paper
Ron McLeod (Corporate Development Telecom Applications Research Alliance)Vagishwari Nagaonkar (Wipro Technologies)
In this paper, the authors describe how hosts may be clustered into user workstations, servers, printers, and hosts compromised by worms.
read