Daniel A. Ray

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
This paper reports the results of our experimentation with modeling worm behavior on a large scale, fully adaptable network simu-lator. Our experiments focused on areas of worm scanning methods, IP address structure, and wireless links that, to the best of our knowledge, have been mostly neglected or abstracted away in prior worm simulations. Namely, our(More)
This paper describes a proof-of-concept system for detecting insider threats. The system measures insider behavior by observing a user's processes and threads, information about user mode and kernel mode time, network interface statistics, etc. The system is built using Mi-crosoft's Windows Management Instrumentation (WMI) implementation of the Web Based(More)
—A digital chain of custody is an account documenting digital data at a particular place and time. This paper gives a method of validating and authenticating a digital chain of custody using an algorithm by Jakobsson and by providing a new algorithm that compliments Jakobsson's algorithm. Our method assumes specialized hardware. The physical hardware is(More)
This paper gives an online algorithm for generating Jakobsson's fractal hash chains [14]. Our new algorithm compliments Jakobsson's fractal hash chain algorithm for preimage traversal since his algorithm assumes the entire hash chain is precomputed and a particular list of ⌈log n⌉ hash elements or pebbles are saved. Our online algorithm for hash chain(More)
  • 1