4 Matching Results

Search Results

Advanced search parameters have been applied.

A prototype implementation of a network-level intrusion detection system. Technical report number CS91-11

Description: This paper presents the implementation of a prototype network level intrusion detection system. The prototype system monitors base level information in network packets (source, destination, packet size, time, and network protocol), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.
Date: May 15, 1991
Creator: Heady, R.; Luger, G.F.; Maccabe, A.B.; Servilla, M. & Sturtevant, J.
Partner: UNT Libraries Government Documents Department

The architecture of a network level intrusion detection system

Description: This paper presents the preliminary architecture of a network level intrusion detection system. The proposed system will monitor base level information in network packets (source, destination, packet size, and time), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.
Date: August 15, 1990
Creator: Heady, R.; Luger, G.; Maccabe, A. & Servilla, M.
Partner: UNT Libraries Government Documents Department

An interactive network design system for MC and A applications

Description: This report outlines enhancements to the design system that have been implemented in the Fall semester of 1987 and the Spring semester of 1988. The report includes a conceptual description of the new modes of operation and describes the refined cost model on which design evaluation is based, updating the report A Design Methodology for MC and A systems. The accompanying user`s guide details operating procedures for the new software. The system as currently implemented provides the following modes of operation: global system design, system graph evaluation, and data allocation.
Date: June 1, 1988
Creator: Helman, P.
Partner: UNT Libraries Government Documents Department

Message passing in PUMA

Description: This paper provides an overview of the message passing primitives provided by PUMA (Performance-oriented, User-managed Messaging Architecture). Message passing in PUMA is based on the concept of a portal--an opening in the address space of an application process. Once an application process has established a portal, other processes can write values into the memory associated with the portal using a simple send operation. Because messages are written directly into the address space of the receiving process, there is not need to buffer messages in the PUMA kernel. This simplifies the design of the kernel, increasing its reliability and portability. Moreover, because messages are mapped directly into the address space of the application process, the application can manage the messages that it receives without needing direct support from the kernel.
Date: May 1, 1993
Creator: Maccabe, A. B. & Wheat, S. R.
Partner: UNT Libraries Government Documents Department