Now showing items 1-3 of 3
Flow Based Observations from NETI@home and Honeynet Data
(Georgia Institute of Technology, 2005-06)
We conduct a flow based comparison of honeynet traffic, representing malicious traffic, and NETI@home traffic, representing typical end user traffic. We present a cumulative distribution function of the number of packets ...
Intrusion Detection Testing and Benchmarking Methodologies
(Georgia Institute of Technology, 2003-03)
The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algorithms and approaches. After conducting a ...
University Methodology for Internetworking Principles and Design Projects
(Georgia Institute of Technology, 2003-05)
An undergraduate engineering internetworking learning environment that presents both internetworking principles and laboratory experimentation is described. The learning environment uses the source code availability of ...