German Florez

Learn More
SUMMARY Current technologies allow efficient data collection by several sensors to determine the overall evaluation of the status of a cluster. However, no previous work of which we are aware analyzes the behavior of the parallel programs themselves in real-time. In this paper, we perform a comparison of different artificial intelligence techniques that can(More)
– This paper describes several scenarios that could potentially be used to implement attacks against a Linux high performance cluster, resulting in actions that corrupt information in the system (i.e. integrity issues), collect important information (i.e. confidentiality violations), and perform denial of service attacks (i.e. availability issues). These(More)
Recently intrusion detection techniques have shifted from user-based and connection-based to process-based intrusion detection. Forrest et al. [2] presented one of the first papers analyzing sequences of system calls issued by a process for intrusion detection. Warrender et al. [11] do a comparison of the accuracy and performance of different algorithms for(More)
  • 1