Rajeev Gopalakrishna

Learn More
Host-based intrusion detection systems attempt to identify attacks by discovering program behaviors that deviate from expected patterns. While the idea of performing behavior validation on-the-fly and terminating errant tasks as soon as a violation is detected is appealing, existing systems exhibit serious shortcomings in terms of accuracy and/or(More)
Current distributed intrusion detection systems are not completely distributed with respect to data analysis because of the presence of centralized data analysis components. This deficiency has many undesirable implications. Here we present a framework for doing distributed intrusion detection with no centralized analysis components. Our approach uses(More)
General-purpose operating systems provide a rich computing environment both to the user and the attacker. The declining cost of hardware and the growing security concerns of software necessitate a revalidation of the many assumptions made in network service architectures. Enforcing sound design principles while retaining usability and flexibility is key to(More)
Worms continue to be a leading security threat on the Internet. This paper analyzes several of the more widespread worms and develops a general life-cycle for them. The lifecycle, from the point of view of the victim host, consists of four stages: target selection, exploitation, infection, and propagation. While not all worms fall into this framework(More)
End-to-end congestion control mechanisms help utilize network resources more optimally because they inherently cooperate with the congestion control mechanisms inside the network. Recent research has shown that coordinating congestion control strategies between flows can improve the performance of the group of flows as a whole. An important aspect of such(More)
Amr El Abbadi Ittai Abraham Alessandro Acquisti Adnan Agbaria Mustaque Ahamad Yair Amir Emmanuelle Anceaume Ross Anderson Murali Annavaram Örjan Askerdal Michael Backes Lee Badger Gal Badishi Saurabh Bagchi David Bakken Tamas Bartha Alberto Bartoli Farokh B. Bastani Rida Bazzi Roberto Beraldi Andreea Berfield Kerry Bernstein Enrico Bertini Elisa Bertino(More)
Improving software assurance is of paramount importance given the impact of software on our lives. Static and dynamic approaches have been proposed over the years to detect security vulnerabilities. These approaches assume that the signature of a defect, for instance the use of a vulnerable library function, is known apriori. A greater challenge is(More)
Current distributed intrusion detection systems are not completely distributed with respect to data analysis because of the presence of centralized data analysis components. This deficiency has many undesirable implications. Here we present a framework for doing distributed intrusion detection with no centralized analysis components. Our approach uses(More)