Joseph Betser

Learn More
Device failures, performance ineeciencies, and security compromises are some of the problems associated with the operations of networked systems. EEective management requires monitoring, interpreting, and controlling the behavior of the distributed resources. Current management systems pursue a platform-centered paradigm, where agents monitor the system and(More)
We describe the goals of the IETF's Intrusion Detection Working Group (IDWG) and the requirements for a transport protocol to communicate among intrusion detection systems. We then describe the design and implementation of IAP, the first attempt at such a protocol. After a discussion of IAP's limitations, we discuss BEEP, a new IETF general framework for(More)
—In the Android operating system, each application consists of a set of components that communicate with each other via messages called Intents. The current implementation of Intent handling is such that developers can inadvertently write insecure code that allows malicious applications to intercept or inject Intents to steal sensitive information or induce(More)
The 13th IEEE/IFIP Network Operations and Management Symposium (NOMS 2012) was held on April 16–20, 2012 in Maui, Hawaii, USA. Held in even-numbered years since 1988, NOMS 2012 followed the 24 years tradition of NOMS and IM as the primary IEEE Communications Society’s (ComSoc) forum for technical exchange on management of information and communication(More)