Search
Now showing items 1-10 of 25
Attack Generation for NIDS Testing Using Natural Deduction
(University of Wisconsin-Madison Department of Computer Sciences, 2004)
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it fails to recognize. For example, to avoid matching between the attack payload and the ...
On the Design and Use of Internet Sinks for Network Abuse Monitoring
(University of Wisconsin-Madison Department of Computer Sciences, 2004)
Network abuse monitoring (eg., for intrusions and denial of service attacks) is an important component in security architecture. Monitoring unused IP addresses offers opportunities to significantly improve perspective on ...
Security Policy Reconciliation in Distributed Computing Environments
(University of Wisconsin-Madison Department of Computer Sciences, 2004)
A major hurdle in sharing resources between organizations is heterogeneity. Therefore, in order for two organizations to collaborate their policies have to be resolved. The process of resolving different policies is known ...
Spatial Resolution Enhancement of Video Using Still Images
(University of Wisconsin-Madison Department of Computer Sciences, 2004)
Images captured by digital video cameras usually have lower spatial resolution than digital still cameras. This paper addresses the problem of combining images from digital still cameras and video cameras to generate a ...
Benchmarking the MRNet Distributed Tool Infrastructure: Lessons Learned
(University of Wisconsin-Madison Department of Computer Sciences, 2004)
MRNet is an infrastructure that provides scalable multicast and data aggregation functionality for distributed tools. While evaluating MRNet?s performance and
scalability, we learned several important lessons about ...
Abstraction Refinement for 3-Valued Logic Analysis
(University of Wisconsin-Madison Department of Computer Sciences, 2004)
This paper concerns the question of how to create abstractions that are useful for program analysis. It presents a method that refines an abstraction automatically for analysis problems in which the semantics of statements ...
Recognizing Faces from Head Rotation
(University of Wisconsin-Madison Department of Computer Sciences, 2004)
A new approach for recognizing human faces is presented that uses video sequences of natural, uncontrolled head rotations to capture face motion and dynamic appearance characteristics. Unlike traditional methods for face ...
Analysis and Evolution of a Journaling File System
(University of Wisconsin-Madison Department of Computer Sciences, 2004)
We present measurements and analysis of the Linux ext3 file system. We develop and apply a novel analysis method known as semantic block-level analysis (SBA), which examines the low-level block stream that a file system ...
A Framework for Malicious Workload Generation
(University of Wisconsin-Madison Department of Computer Sciences, 2004)
Malicious traffic from self-propagating worms and denial-of-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats demands appropriate tools to conduct ...
Content-Based Routing for Continuous Query-Optimization
(University of Wisconsin-Madison Department of Computer Sciences, 2004)
Current Data Stream Management Systems do not fully exploit their adaptive nature to handle complex queries. To date, such systems route stream tuples to operators or operator paths based only on operator-level statistics. ...










