Michael Collins (RedJack)
Redjack
Publications by Michael Collins (RedJack)
-
Network Monitoring and Deceptive Defenses
January 11, 2016 • Presentation
Michael Collins (RedJack)Brian Satira (Noblis)
In this FloCon 2016 presentation, the authors discuss the use of network monitoring to support deceptive defenses.
read -
Using Vantage to Manage Complex Sensor Networks
January 12, 2015 • Presentation
Michael Collins (RedJack)
In this talk, Michael Collins introduces a systematic methodology for analyzing the vantage of sensor systems.
read -
Identifying Network Traffic Activity Via Flow Sizes
January 07, 2013 • Presentation
Michael Collins
In this presentation, given at FloCon 2013, Michael Collins discusses how to measure NetFlow and DNS traffic captures.
read -
Flow Traffic Analysis Narratives
January 11, 2010 • Presentation
Michael Collins
In this presentation, Michael Collins describes the importance of developing narratives that abstractly describe activity between hosts.
read -
Integrating Human and Synthetic Reasoning Via Model-Based Analysis
January 12, 2009 • Presentation
Michael Collins
In this presentation, Michael Collins describes a model that combines AI and user interface through fault trees to capture knowledge and improve efficiency.
read -
Attack Reduction and Anomaly Modeling in Popularly Targeted Protocols
January 07, 2008 • Presentation
Michael Collins
In this presentation, Michael Collins discusses noise in traffic flows and its effect on anomaly detection, two-stage filtering, and methods to reduce attacks.
read -
Predicting Future Botnet Addresses With Uncleanliness
May 09, 2007 • Conference Paper
Michael CollinsTimothy J. ShimeallSid Faber
In this paper, the authors discuss whether we can effectively predict future bot locations.
read -
Finding Peer-To-Peer File-Sharing Using Coarse Network Behaviors?
September 04, 2006 • White Paper
Michael CollinsMichael K. Reiter
In this paper, the authors propose a set of tests for identifying masqueraded peer-to-peer file-sharing based on traffic summaries (flows).
read -
A Model for Opportunistic Network Exploits: The Case of P2P Worms
July 13, 2006 • White Paper
Carrie GatesMichael Collins
In this paper, the authors present VisFlowConnect-IP, a network flow visualization tool that detects and investigates anomalous network traffic.
read -
Time, Pollution and Maps
September 20, 2005 • Presentation
Michael Collins
In these proceedings, the presentations given at Flocon 2012 are collected.
read -
Advanced Security Reporting Systems for Large Network Situational Awareness
June 01, 2005 • White Paper
Michael CollinsGreg Virgin (Redjack)
In this paper, the authors describe the technologies that support an asset inventory system and enable a flexible, ad-hoc intrusion detection capability.
read -
Empirically Based Analysis: The DDoS Case
July 22, 2004 • Presentation
Michael Collins
In this keynote presentation, John McHugh explores four themes in thinking about flow analysis.
read -
An Empirical Analysis of Target-Resident DoS Filters
May 09, 2004 • White Paper
Michael CollinsMichael K. Reiter
In this paper, the authors provide an empirical analysis of proposed techniques for filtering network traffic.
read -
More Netflow Tools: For Performance and Security
November 14, 2003 • Conference Paper
Carrie GatesMichael CollinsMichael Duggan
In this paper, the authors present a suite of tools for network traffic collection and analysis based on Cisco NetFlow.
read