Person:
Owen,
Henry L., III
Owen,
Henry L., III
Permanent Link
Associated Organization(s)
Organizational Unit
ORCID
ArchiveSpace Name Record
Publication Search Results
Now showing
1 - 8 of 8
-
ItemNASA acts review team(Georgia Institute of Technology, 1994) Owen, Henry L., III ; Georgia Institute of Technology. Office of Sponsored Programs ; Georgia Institute of Technology. School of Electrical and Computer Engineering ; Georgia Institute of Technology. Office of Sponsored Programs
-
ItemUniversity Methodology for Internetworking Principles and Design Projects(Georgia Institute of Technology, 2003-05) Abler, Randal T. ; Owen, Henry L., III ; Riley, George F. ; Georgia Institute of Technology. School of Electrical and Computer EngineeringAn undergraduate engineering internetworking learning environment that presents both internetworking principles and laboratory experimentation is described. The learning environment uses the source code availability of the Linux operating system as a case study of the implementation issues and ramifications of internet networking infrastructures. Laboratory use of experimentation with internetworking equipment and software allows interaction with internetworking principles and fundamentals as well as implementation and performance issues. The objectives of this environment include providing a comprehensive mechanism whereby students are exposed to fundamentals and principles that may readily be applied to experimental-based internetwork research and internetwork product development. A follow-on capstone design environment is also briefly described.
-
ItemSynchronous digital hierarchy network analysis tool(Georgia Institute of Technology, 1998) Owen, Henry L., III ; Georgia Institute of Technology. School of Electrical and Computer Engineering ; Georgia Institute of Technology. Office of Sponsored Programs ; Georgia Institute of Technology. Office of Sponsored Programs
-
Item21st century ATM technologies, telecommunications and techniques(Georgia Institute of Technology, 1998) Barnes, Brian E. ; Aaron, Jeffrey A. ; Mckinnon, Martin W. ; Porter, Alan L. ; Owen, Henry L., III ; Evans, Jeffrey W. ; Georgia Tech Research Institute ; Georgia Institute of Technology. Office of Sponsored Programs ; Georgia Institute of Technology. Office of Sponsored Programs
-
ItemMOS transistor and interconnection path strength simulation algorithm and hardware acceleration on a two-dimensional processing element array(Georgia Institute of Technology, 1989-08) Owen, Henry L., III ; Schlag, Jay H. ; Electric Engineering
-
ItemIntegrated digital design laboratory(Georgia Institute of Technology, 1990) Parker, A. ; Owen, Henry L., III ; Georgia Institute of Technology. Office of Sponsored Programs ; Georgia Institute of Technology. School of Electrical Engineering ; Georgia Institute of Technology. Office of Sponsored Programs
-
ItemIntrusion Detection Testing and Benchmarking Methodologies(Georgia Institute of Technology, 2003-03) Athanasiades, Nicholas ; Abler, Randal T. ; Levine, John G. (John Glenn) ; Owen, Henry L., III ; Riley, George F. ; Georgia Institute of Technology. School of Electrical and Computer EngineeringThe ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algorithms and approaches. After conducting a survey of the literature on the methods and techniques being used, it can be seen that a new approach that incorporates an open source testing methodology and environment would benefit the information assurance community. After summarizing the literature and presenting several example test and evaluation environments that have been used in the past, we propose a new open source evaluation environment and methodology for use by researchers and developers of new intrusion detection and denial of service detection and prevention algorithms and methodologies.
-
ItemFlow Based Observations from NETI@home and Honeynet Data(Georgia Institute of Technology, 2005-06) Grizzard, Julian B. ; Simpson, Charles Robert, Jr. ; Krasser, Sven ; Owen, Henry L., III ; Riley, George F. ; Georgia Institute of Technology. School of Electrical and Computer EngineeringWe conduct a flow based comparison of honeynet traffic, representing malicious traffic, and NETI@home traffic, representing typical end user traffic. We present a cumulative distribution function of the number of packets for a TCP flow and learn that a large portion of these flows in both datasets are failed and potentially malicious connection attempts. Next, we look at a histogram of TCP port activity over large time scales to gain insight into port scanning and worm activity. One key observation is that new worms can linger on for more than a year after the initial release date. Finally, we look at activity relative to the IP address space and observe that the sources of malicious traffic are spread across the allocated range.