Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 11 - 20 of 38 results for the Publish Year - 2005 , Type - White Paper

White Paper | September 2005 - White Paper Detecting Distributed Attacks using Network-Wide Flow Traffic By Anukool Lakhina (Intel), Mark Crovella (Boston University), Chrisophe Diot (Intel)

In this paper, the authors present their methods for detecting distributed attacks in backbone networks using sampled flow traffic data.

White Paper | September 2005 - White Paper Flow-Data Compressibility Changes During Internet Worm ... By Arno Wagner (Communication Systems Laboratory Swiss Federal Institute of Technology Zurich (ETH Zurich))

In this paper, Arno Wagner presents measurements and analysis done on a Swiss internet backbone during the Blaster and Witty internet worm outbreak.

White Paper | May 2005 - White Paper Technical Trends in Phishing Attacks By Jason Milletary

In this paper, Jason Milletary identifies technical capabilities used to conduct phishing scams, reviews trends, and discusses countermeasures.

White Paper | September 2005 - White Paper IP Flow Information Export (IPFIX): Applicability and Future ... By Elisa Boschi (Hitachi), Tanja Zseby (Fraunhofer Fokus), Mark Lutz (Fraunhofer Fokus), Thomas Hirsch (Fraunhofer Fokus)

In this paper, the authors present the IPFIX protocol and discuss its applicability with a special focus on network security.

White Paper | January 2005 - White Paper Preliminary System Dynamics Maps of the Insider Cyber ... By David F. Andersen (University at Albany State University of New York), Elise A. Weaver (Worcester Polytechnic Institute), Aldo Zagonel (University at Albany - Rockefeller College of Public Affairs and Policy), Dawn Cappelli, Jose J. Gonzalez (Agder University College Norway), Mohammad Mojtahedzadeh (Attune Group - Inc.), Andrew P. Moore, Eliot Rich (University at Albany State University of New York), Jose M. Sarriegui (University of Navarra Spain), Timothy J. Shimeall, Jeffrey M. Stanton (Syracuse University - School of Information Studies)

This paper discusses the preliminary system dynamic maps of the insider cyber-threat and describes the main ideas behind the research proposal.

White Paper | September 2005 - White Paper A Proposed Translation Data Model for Flow Format ... By Brian Trammell

In this paper, Brian Trammell presents a proposed solution to the problem of mutual unintelligibility of raw flow and intermediate analysis data.

White Paper | June 2005 - White Paper Word Level Predicate Abstraction and Refinement for ... By Daniel Kroening, Natasha Sharygina, Edmund Clarke

This paper proposes to use predicate abstraction for verifying RTL Verilog, a technique successfully used for software verification.

White Paper | June 2005 - White Paper The CENTAUR System: Helping to Protect the NIPRNet By Marc I. Kellner, Jeffrey Jaime (Applied Technology Unit - Joint Task Force - Global Network Operations, United States Strategic Command)

In this paper, the authors describe the CENTAUR system, which was developed to help DoD security analysts better understand and defend the NIPRNet.

White Paper | August 2005 - White Paper Simulating Insider Cyber-Threat Risks: A Model-Based Case ... By Eliot Rich (University at Albany State University of New York), Howard F. Lipson, Dave Mundie, Jose M. Sarriegui (University of Navarra Spain), Agata Sawicka (Agder University College Norway), Thomas R. Stewart (University at Albany State University of New York), Jose M. Torres (University of Navarra Spain), Elise A. Weaver (Worcester Polytechnic Institute), Johannes Wiik (Agder University College Norway), Ignacio J. Martinez-Moyano (University at Albany State University of New York), Paul Conrad, Dawn Cappelli, Andrew P. Moore, Timothy J. Shimeall, David F. Andersen (University at Albany State University of New York), Jose J. Gonzalez (Agder University College Norway), Robert J. Ellison

In this paper, the authors identify actions that may inadvertently lead to increased vulnerability to threats from employees, contractors, and clients.

White Paper | September 2005 - White Paper Identifying P2P Heavy-Hitters from Network-Flow Data By Arno Wagner (Communication Systems Laboratory Swiss Federal Institute of Technology Zurich (ETH Zurich)), Thomas Dubendorfer (Communication Systems Laboratory Swiss Federal Institute of Technology Zurich (ETH Zurich)), Lukas Hammerle (Communication Systems Laboratory Swiss Federal Institute of Technology Zurich (ETH Zurich)), Bernhard Plattner (Communication Systems Laboratory Swiss Federal Institute of Technology Zurich (ETH Zurich))

In this September 2005 paper, the authors present measurements done on a medium sized internet backbone and discusses accuracy issues.

Refine