Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 13 results for the flocon Publish Year - 2005 , Type - White Paper

White Paper | September 2005 - White Paper Correlations Between Quiescent Ports in Network Flows ... By Josh McNutt, Markus Deshon

In this paper, the authors introduce a method for detecting the onset of anomalous port-specific activity by recognizing deviation from correlated activity.

White Paper | September 2005 - White Paper R: A Proposed Analysis and Visualization Environment for ... By Josh McNutt

In this paper, Josh McNutt discusses the R statistical language as an analysis and visualization interface to SiLK flow analysis tools.

White Paper | September 2005 - White Paper NVisionIP: An Animated State Analysis Tool for Visualizing ...

In this paper, the authors describe NVisionIP, a NetFlow visualization tool.

White Paper | September 2005 - White Paper CANINE: A NetFlows Converter/Anonymizer Tool for Format ... By Katherine Luo (National Center for Supercomputing Applications (NCSA) University of Illinois at Urbana-Champaign), Adam Slagell (National Center for Supercomputing Applications (NCSA) at University of Illinois at Urbana-Champaign), William Yurcik (National Center for Supercomputing Applications (NCSA) at University of Illinois at Urbana-Champaign), Yifan Li (National Center for Supercomputing Applications (NCSA) University of Illinois at Urbana-Champaign)

In this paper, the authors introduce a tool to address two problems with using Net-Flow logs for security analysis.

White Paper | September 2005 - White Paper Covert Channel Detection Using Process Query Systems ... By Vincent Berk (Dartmouth College)

In this FloCon 2005 presentation, the author uses traffic analysis to investigate a stealthy form of data exfiltration.

White Paper | September 2005 - White Paper A Proposed Translation Data Model for Flow Format ... By Brian Trammell

In this paper, Brian Trammell presents a proposed solution to the problem of mutual unintelligibility of raw flow and intermediate analysis data.

White Paper | September 2005 - White Paper Detecting Distributed Attacks using Network-Wide Flow Traffic By Anukool Lakhina (Intel), Mark Crovella (Boston University), Chrisophe Diot (Intel)

In this paper, the authors present their methods for detecting distributed attacks in backbone networks using sampled flow traffic data.

White Paper | September 2005 - White Paper Flow-Data Compressibility Changes During Internet Worm ... By Arno Wagner (Communication Systems Laboratory Swiss Federal Institute of Technology Zurich (ETH Zurich))

In this paper, Arno Wagner presents measurements and analysis done on a Swiss internet backbone during the Blaster and Witty internet worm outbreak.

White Paper | September 2005 - White Paper IP Flow Information Export (IPFIX): Applicability and Future ... By Elisa Boschi (Hitachi), Tanja Zseby (Fraunhofer Fokus), Mark Lutz (Fraunhofer Fokus), Thomas Hirsch (Fraunhofer Fokus)

In this paper, the authors present the IPFIX protocol and discuss its applicability with a special focus on network security.

White Paper | June 2005 - White Paper The CENTAUR System: Helping to Protect the NIPRNet By Marc I. Kellner, Jeffrey Jaime (Applied Technology Unit - Joint Task Force - Global Network Operations, United States Strategic Command)

In this paper, the authors describe the CENTAUR system, which was developed to help DoD security analysts better understand and defend the NIPRNet.