Sven Henkel

  • Citations Per Year
Learn More
We present a prototype of an Intrusion Warning System for combining event message flows of multiple domain-specific security tools in order to determine anomalies for early warning and response. Unlike other approaches for cooperating Intrusion Detection Systems (IDS), we suggest a modified star shape architecture for distributing attack information and(More)
Koalitionsumgebungen sollen für alle miteinander kooperierenden Mitglieder einen Vorteil bei der Verfolgung eines gemeinsamen Ziels erbringen. Dies gilt für die verschiedensten Anwendungsbereiche, etwa bei kooperierenden Strafverfolgungsbehörden, Wirtschaftsunternehmen oder Streitkräfte. Auch bei der Erkennung von sicherheitsrelevanten Vorgängen in(More)
This work investigates the amount of information about failures required to simulate a synchronous distributed system by an asynchronous distributed system prone to crash-recovery failures. A failure detection sequencer ΣCR for the crash-recovery failure model is defined, which outputs information about crashes and recoveries and about the state of the(More)
This paper presents an anomaly detection approach for application in Meta IDS environments, where locally generated event messages from several domains are centrally processed. The basic approach has been successfully used for detection of abnormal traffic structures in computer networks. It creates directed graphs from address specifications contained(More)
  • S A Henkel
  • Research quarterly for exercise and sport
  • 1991
Management of conduct has been considered the most important problem facing schools in America during 16 of the last 20 years (Gallup, 1988). Yet little is known about specific techniques teachers use to achieve pupil control in physical education. One purpose of this work is to describe the development of a conceptual framework for pupil control(More)
  • 1