Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
Articles 1 - 5 of 5
Full-Text Articles in OS and Networks
A Distributed Network Logging Topology, Nicholas E. Fritts
A Distributed Network Logging Topology, Nicholas E. Fritts
Theses and Dissertations
Network logging is used to monitor computer systems for potential problems and threats by network administrators. Research has found that the more logging enabled, the more potential threats can be detected in the logs (Levoy, 2006). However, generally it is considered too costly to dedicate the manpower required to analyze the amount of logging data that it is possible to generate. Current research is working on different correlation and parsing techniques to help filter the data, but these methods function by having all of the data dumped in to a central repository. Central repositories are limited in the amount of …
Development Of A Methodology For Customizing Insider Threat Auditing On A Microsoft Windows Xp® Operating System, Terry E. Levoy
Development Of A Methodology For Customizing Insider Threat Auditing On A Microsoft Windows Xp® Operating System, Terry E. Levoy
Theses and Dissertations
Most organizations are aware that threats from trusted insiders pose a great risk to their organization and are very difficult to protect against. Auditing is recognized as an effective technique to detect malicious insider activities. However, current auditing methods are typically applied with a one-size-fits-all approach and may not be an appropriate mitigation strategy, especially towards insider threats. This research develops a 4-step methodology for designing a customized auditing template for a Microsoft Windows XP operating system. Two tailoring methods are presented which evaluate both by category and by configuration. Also developed are various metrics and weighting factors as a …
A Novel Distributed Denial-Of-Service Detection Algorithm, Brett Tsudama
A Novel Distributed Denial-Of-Service Detection Algorithm, Brett Tsudama
Master's Theses
The applicability of implementing Ratio-based SYN Flood Detection (RSD) on a network processor is explored, and initial results are presented.
Multicast Algorithms For Mobile Satellite Communication Networks, Ryan W. Thomas
Multicast Algorithms For Mobile Satellite Communication Networks, Ryan W. Thomas
Theses and Dissertations
With the rise of mobile computing and an increasing need for ubiquitous high speed data connections, Internet-in-the-sky solutions are becoming increasingly viable. To reduce the network overhead of one-to-many transmissions, the multicast protocol has been devised. The implementation of multicast in these Low Earth Orbit (LEO) constellations is a critical component to achieving an omnipresent network environment. This research examines the system performance associated with two terrestrial-based multicast mobility solutions, Distance Vector Multicast Routing Protocol (DVMRP) with mobile IP and On Demand Multicast Routing Protocol (ODMRP). These protocols are implemented and simulated in a six plane, 66 satellite LEO constellation. …
An Investigation On Sun Microsystems Jini Technology, Ferdina D. Soeyadi
An Investigation On Sun Microsystems Jini Technology, Ferdina D. Soeyadi
Theses : Honours
Sun Microsystems introduced the JiniTM Technology as its vision of the future in networking, where services can be registered dynamically and he used easily regardless of their location in the network. This is an investigation of feasibility on such claims made by Sun regarding JiniTM and comparisons with the directly similar Universal Plug and Play from Microsoft. The aim is to implement a simple application of the JiniTM Technology in order to demonstrate its capabilities as a contribution to the distributed computing research.