Browsing by Subject "Intrusion detection"
Now showing 1 - 9 of 9
- Results Per Page
- Sort Options
Item Anomaly detection of time series.(2010-05) Cheboli, DeepthiThis thesis deals with the problem of anomaly detection for time series data. Some of the important applications of time series anomaly detection are healthcare, eco-system disturbances, intrusion detection and aircraft system health management. Although there has been extensive work on anomaly detection (1), most of the techniques look for individual objects that are different from normal objects but do not consider the sequence aspect of the data into consideration. In this thesis, we analyze the state of the art of time series anomaly detection techniques and present a survey. We also propose novel anomaly detection techniques and transformation techniques for the time series data. Through extensive experimental evaluation of the proposed techniques on the data sets collected across diverse domains, we conclude that our techniques perform well across many datasets.Item Oral history interview with Dorothy E. Denning(Charles Babbage Institute, 2013-04-11) Denning, Dorothy E.Computer security pioneer Dorothy Denning discusses her career including her Lattice Model for Computer Security, research on database security, intrusion detection, and other areas, such as her influential textbooks. The interview also addresses computer security research infrastructure and collaborators at various institutions where she worked including Purdue University, SRI International, Digital Equipment Corporation, Georgetown University, and Naval Postgraduate School. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Eugene H. Spafford(Charles Babbage Institute, 2013-11-12) Spafford, Eugene H.This interview with computer security pioneer Eugene Spafford spans from his early education to the near present (2013). He discusses how he came to focus on computer security as a research field and his long and ongoing career as a faculty member, editor-in-chief (Computers & Security), center director, and educator. A substantial portion of the interview addresses his work in founding and leading a premier center for computer security research—COAST Lab (Computer Operations, Audit, and Security Technology), which evolved to become CERIAS (Center for Education and Research in Information Assurance and Security). CERIAS is the largest academic research center on information assurance and computer security and has had tremendous influence on the field from its pioneer research and education to its highly regarded symposiums and outreach. Among other topics Spafford discusses are intrusion detection research and development, Unix security, Tripwire, the Association for Computing Machinery, service to the federal government, and the importance of a sense of humor. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Karl Levitt(Charles Babbage Institute, 2013-06-06) Levitt, KarlComputer security pioneer discusses his educational background and early career, with the bulk of the interview on his approximately four decades plus focus on computer security research. He discusses his work with fault-tolerant systems, the institutional setting and his research and management roles at SRI (including PSOS, IDES/NIDES, etc.). He also discusses joining the faculty at UC-Davis in Computer Science and launching its Computer Security Laboratory, which has been influential in educating and placing computer security specialists in academe, government, and industry. Also discussed is his post-IDES/NIDES work on intrusion detection, voting systems and security, federal funding for computer security, his program manager role for Trustworthy Computing at NSF, and other topics. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Matt Bishop(Charles Babbage Institute, 2013-06-06) Bishop, MattThis interview with computer security pioneer Matt Bishop discusses his doctoral research (access controls and the Take-Grant Protection Model) working with Dorothy Denning at Purdue University and subsequent career as a computer scientist and computer security specialist at the Research Institute of Advanced Computer Science, on the faculty at Dartmouth University, and on the faculty at University of California-Davis. Bishop’s research is wide-ranging and the interview touches on his work on Unix security and vulnerabilities, network security, intrusion detection, electronic voting systems, and other areas. Bishop recounts the project he launched to provide public (Web) access to seminal early papers in computer security, an important effort to facilitate computer security history and learning from the past. And he relates the evolution of the UC-Davis Computer Security Lab and its influence on the research field and education in computer security. He also discusses his role as an educator and the authoring of his textbook Computer Security: Art and Science (2002). This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Peter G. Neumann(Charles Babbage Institute, 2013-06-03) Neumann, Peter G.In this interview, computer security pioneer Peter G. Neumann relates his education at Harvard University (A.B. in Math, S.M. and Ph.D. in Applied Math), including an influential (to his perspective and career) two-hour long meeting/discussion as an undergraduate with Albert Einstein (discussing “complexity” and other topics). The vast majority of the interview addresses the many facets of his highly influential career in computer security research. With regard to the latter, this includes discussion of his work at Bell Labs and extensive involvement with MULTICS security, and his subsequent four-decade (and continuing) career as a research scientist at SRI International. He tells of his work and leadership with the Provably Secure Operating System (PSOS), research and writing on risks (including moderating the ACM Risks Forum), insider misuse and intrusion-detection systems (IDES, NIDES, EMERALD), and his current work on two DARPA-funded projects that builds on key lessons of the past to design and develop secure/trustworthy computer systems. He also relates the computer security research infrastructure and how it evolved, as well as comments on a number of other topics such as the major computer security conferences and the range of perspectives of researchers in the computer security research community. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Rebecca G. Bace(Charles Babbage Institute, 2012-07-31) Bace, Rebecca G.Rebecca Bace, who has a Master of Engineering Science degree from Loyola College, is a leading figure in the computer security field of intrusion detection. She is the author the influential textbook on this topic, Intrusion Detection, and was leader of the pioneering Computer Misuse and Anomaly Detection (CMAD) Research Program at the National Security Agency from 1989 to 1995. In this capacity, she sponsored much of the first wave of path breaking academic research on intrusion detection. This interview briefly addresses Ms. Bace’s education and early professional life before focusing on her dozen years at the NSA, and specifically her leadership of CMAD. In detailing the portfolio of early CMAD sponsored projects that Bace supported, it provides an important lens into the early evolution of intrusion detection as a research field and area of practice, and identifies many of this field’s pioneering contributors. The interview also briefly touches on Bace’s work after leaving the NSA, including at Los Alamos National Laboratory and as President of the consulting firm Infidel, Inc. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Richard A. Kemmerer(Charles Babbage Institute, 2014-04-30) Kemmerer, Richard A.Computer security pioneer Richard Kemmerer discusses his graduate training (at UCLA), his early and long-term consulting work for System Development Corporation in computer security research and development, and his research and education of graduate students at University of California at Santa Barbara. Among the topics covered are his work on Secure Unix, electronic voting, intrusion detection, and other areas. He also relates perspectives on early conferences (VERkshop, IEEE Symposium on Security and Privacy, and others), the NCSC and TCSEC, and other topics. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Teresa F. Lunt(Charles Babbage Institute, 2013-06-04) Lunt, Teresa F.This interview with computer security pioneer Teresa Lunt discusses her work in the computer security field at MITRE Corporation, SRI International, DARPA, and PARC. At SRI she was a principal research scientist on IDES, the first meaningful intrusion detection expert system. Lunt also discusses her work at SRI pioneering a highly secure database system (research initially launched by Dorothy Denning), as well as her work at DARPA’s Information Technology Office where she started programs to fund research in computer and network security. The interview concludes with her discussion of security work at PARC, where she is the Director of the Computer Science Laboratory. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”