Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 38 results for the Publish Year - 2005 , Type - White Paper

White Paper | September 2005 - White Paper Correlations Between Quiescent Ports in Network Flows ... By Josh McNutt, Markus Deshon

In this paper, the authors introduce a method for detecting the onset of anomalous port-specific activity by recognizing deviation from correlated activity.

White Paper | September 2005 - White Paper VisFlowConnect-IP: An Animated Link Analysis Tool For ...

In this paper, the authors present VisFlowConnect-IP, a network flow visualization tool that detects and investigates anomalous network traffic.

White Paper | September 2005 - White Paper R: A Proposed Analysis and Visualization Environment for ... By Josh McNutt

In this paper, Josh McNutt discusses the R statistical language as an analysis and visualization interface to SiLK flow analysis tools.

White Paper | September 2005 - White Paper NVisionIP: An Animated State Analysis Tool for Visualizing ...

In this paper, the authors describe NVisionIP, a NetFlow visualization tool.

White Paper | September 2005 - White Paper CANINE: A NetFlows Converter/Anonymizer Tool for Format ... By Katherine Luo (National Center for Supercomputing Applications (NCSA) University of Illinois at Urbana-Champaign), Adam Slagell (National Center for Supercomputing Applications (NCSA) at University of Illinois at Urbana-Champaign), William Yurcik (National Center for Supercomputing Applications (NCSA) at University of Illinois at Urbana-Champaign), Yifan Li (National Center for Supercomputing Applications (NCSA) University of Illinois at Urbana-Champaign)

In this paper, the authors introduce a tool to address two problems with using Net-Flow logs for security analysis.

White Paper | September 2005 - White Paper Covert Channel Detection Using Process Query Systems ... By Vincent Berk (Dartmouth College)

In this FloCon 2005 presentation, the author uses traffic analysis to investigate a stealthy form of data exfiltration.

White Paper | May 2005 - White Paper A Taxonomy of Security-Related Requirements By Donald Firesmith

This paper addresses the problems associated with a lack of a clear security taxonomy by identifying four different types of security-related requirements, providing them with clear definitions, and placing them within an organizing hierarchical taxonomy.

White Paper | September 2005 - White Paper A Proposed Translation Data Model for Flow Format ... By Brian Trammell

In this paper, Brian Trammell presents a proposed solution to the problem of mutual unintelligibility of raw flow and intermediate analysis data.

White Paper | May 2005 - White Paper Method Engineering and COTS Evaluation By B. Henderson-Sellers, C. Gonzalez-Perez, M.K.Serour, Donald Firesmith

This position paper argues that a successful COTS evaluation process should be based on the principles of method engineering (ME).

White Paper | December 2005 - White Paper Botnets as a Vehicle for Online Crime By Nicholas Ianelli, Aaron Hackworth

In this paper, the authors describe the capabilities present in bot malware and the motivations for operating botnets.

Refine