Person:
Owen, Henry L., III

Associated Organization(s)
ORCID
ArchiveSpace Name Record

Publication Search Results

Now showing 1 - 2 of 2
  • Item
    University Methodology for Internetworking Principles and Design Projects
    (Georgia Institute of Technology, 2003-05) Abler, Randal T. ; Owen, Henry L., III ; Riley, George F.
    An undergraduate engineering internetworking learning environment that presents both internetworking principles and laboratory experimentation is described. The learning environment uses the source code availability of the Linux operating system as a case study of the implementation issues and ramifications of internet networking infrastructures. Laboratory use of experimentation with internetworking equipment and software allows interaction with internetworking principles and fundamentals as well as implementation and performance issues. The objectives of this environment include providing a comprehensive mechanism whereby students are exposed to fundamentals and principles that may readily be applied to experimental-based internetwork research and internetwork product development. A follow-on capstone design environment is also briefly described.
  • Item
    Intrusion Detection Testing and Benchmarking Methodologies
    (Georgia Institute of Technology, 2003-03) Athanasiades, Nicholas ; Abler, Randal T. ; Levine, John G. (John Glenn) ; Owen, Henry L., III ; Riley, George F.
    The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algorithms and approaches. After conducting a survey of the literature on the methods and techniques being used, it can be seen that a new approach that incorporates an open source testing methodology and environment would benefit the information assurance community. After summarizing the literature and presenting several example test and evaluation environments that have been used in the past, we propose a new open source evaluation environment and methodology for use by researchers and developers of new intrusion detection and denial of service detection and prevention algorithms and methodologies.