Person:
Owen, Henry L., III

Associated Organization(s)
ORCID
ArchiveSpace Name Record

Publication Search Results

Now showing 1 - 8 of 8
  • Item
    Flow Based Observations from NETI@home and Honeynet Data
    (Georgia Institute of Technology, 2005-06) Grizzard, Julian B. ; Simpson, Charles Robert, Jr. ; Krasser, Sven ; Owen, Henry L., III ; Riley, George F.
    We conduct a flow based comparison of honeynet traffic, representing malicious traffic, and NETI@home traffic, representing typical end user traffic. We present a cumulative distribution function of the number of packets for a TCP flow and learn that a large portion of these flows in both datasets are failed and potentially malicious connection attempts. Next, we look at a histogram of TCP port activity over large time scales to gain insight into port scanning and worm activity. One key observation is that new worms can linger on for more than a year after the initial release date. Finally, we look at activity relative to the IP address space and observe that the sources of malicious traffic are spread across the allocated range.
  • Item
    University Methodology for Internetworking Principles and Design Projects
    (Georgia Institute of Technology, 2003-05) Abler, Randal T. ; Owen, Henry L., III ; Riley, George F.
    An undergraduate engineering internetworking learning environment that presents both internetworking principles and laboratory experimentation is described. The learning environment uses the source code availability of the Linux operating system as a case study of the implementation issues and ramifications of internet networking infrastructures. Laboratory use of experimentation with internetworking equipment and software allows interaction with internetworking principles and fundamentals as well as implementation and performance issues. The objectives of this environment include providing a comprehensive mechanism whereby students are exposed to fundamentals and principles that may readily be applied to experimental-based internetwork research and internetwork product development. A follow-on capstone design environment is also briefly described.
  • Item
    Intrusion Detection Testing and Benchmarking Methodologies
    (Georgia Institute of Technology, 2003-03) Athanasiades, Nicholas ; Abler, Randal T. ; Levine, John G. (John Glenn) ; Owen, Henry L., III ; Riley, George F.
    The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algorithms and approaches. After conducting a survey of the literature on the methods and techniques being used, it can be seen that a new approach that incorporates an open source testing methodology and environment would benefit the information assurance community. After summarizing the literature and presenting several example test and evaluation environments that have been used in the past, we propose a new open source evaluation environment and methodology for use by researchers and developers of new intrusion detection and denial of service detection and prevention algorithms and methodologies.
  • Item
    21st century ATM technologies, telecommunications and techniques
    (Georgia Institute of Technology, 1998) Barnes, Brian E. ; Aaron, Jeffrey A. ; Mckinnon, Martin W. ; Porter, Alan L. ; Owen, Henry L., III ; Evans, Jeffrey W.
  • Item
    Synchronous digital hierarchy network analysis tool
    (Georgia Institute of Technology, 1998) Owen, Henry L., III
  • Item
    NASA acts review team
    (Georgia Institute of Technology, 1994) Owen, Henry L., III
  • Item
    Integrated digital design laboratory
    (Georgia Institute of Technology, 1990) Parker, A. ; Owen, Henry L., III