Learn More
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mechanism at their connection to the Internet. Large Enterprise Networks, such as the network for a major university, are very inviting targets to hackers who are looking to exploit(More)
The current generation of centralized network intrusion detection systems (NIDS) have various limitations on their performance and effectiveness. In this paper, we argue that intrusion detection analysis should be distributed to network node IDS (NNIDS) running in hardware on the end hosts. An NNIDS can unambiguously inspect traffic to and from the host,(More)
—An undergraduate internetwork, security-teaching laboratory, which includes both defensive and offensive security laboratory experimentation, is described. This laboratory is oriented toward an introductory internetworking security class and is intended to complement more theoretical network security classes while sparking student interest. The laboratory(More)
To my sister Susan Nadine Grizzard – A truly amazing person ACKNOWLEDGEMENTS Most importantly, I would like to deeply thank my advisor Dr. Henry Owen for his unparalleled brilliance and excellent guidance. His continuous encouragement and unwavering support have been of tremendous value to me. I would also like to thank my committee members Dr. Their(More)
The paper presents the design of an integrated malware collection and analysis framework for botnet tracking. In proposed framework we have used Honypots as malware capturing tool. The proposed system design is unique in the sense that the information regarding the configuration of honeypot on which malware sample has been captured is saved with malware(More)
Computer-aided manufacturing (CAM) is essential to the everyday operations of many manufacturing facilities. CAM software is used to aid in the manufacturing of a part by converting a computer model into instructions for a machine tool. Most frequently, CAM is used to generate G-Code, which is the standard programming language of CNC turning and milling(More)
  • 1