Zum Hauptinhalt springen

Showing 1–13 of 13 results for author: Yurcik, W

Searching in archive cs. Search in all archives.
.
  1. arXiv:0710.3979  [pdf

    cs.CR cs.NI

    Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs

    Authors: William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham

    Abstract: Network data needs to be shared for distributed security analysis. Anonymization of network data for sharing sets up a fundamental tradeoff between privacy protection versus security analysis capability. This privacy/analysis tradeoff has been acknowledged by many researchers but this is the first paper to provide empirical measurements to characterize the privacy/analysis tradeoff for an enterp… ▽ More

    Submitted 26 October, 2007; v1 submitted 22 October, 2007; originally announced October 2007.

    Comments: 8 pages,1 figure, 4 tables

    ACM Class: C.2.0; C.2.3; C.2.m; D.3.4; K.6.5

  2. arXiv:cs/0608034  [pdf

    cs.CR

    Security Assessment of E-Tax Filing Websites

    Authors: Aashish Sharma, William Yurcik

    Abstract: Technical security is only part of E-Commerce security operations; human usability and security perception play major and sometimes dominating factors. For instance, slick websites with impressive security icons but no real technical security are often perceived by users to be trustworthy (and thus more profitable) than plain vanilla websites that use powerful encryption for transmission and ser… ▽ More

    Submitted 6 August, 2006; originally announced August 2006.

    Comments: 9 pages

  3. arXiv:cs/0607111  [pdf

    cs.CR

    UCLog+ : A Security Data Management System for Correlating Alerts, Incidents, and Raw Data From Remote Logs

    Authors: William Yurcik, Cristina Abad, Ragib Hasan, Moazzam Saleem, Shyama Sridharan

    Abstract: Source data for computer network security analysis takes different forms (alerts, incidents, logs) and each source may be voluminous. Due to the challenge this presents for data management, this has often lead to security stovepipe operations which focus primarily on a small number of data sources for analysis with little or no automated correlation between data sources (although correlation may… ▽ More

    Submitted 25 July, 2006; originally announced July 2006.

    Comments: 10 pages, 9 Tables, 16 Figures

  4. arXiv:cs/0606089  [pdf

    cs.CR cs.DC

    NVision-PA: A Tool for Visual Analysis of Command Behavior Based on Process Accounting Logs (with a Case Study in HPC Cluster Security)

    Authors: Charis Ermopoulos, William Yurcik

    Abstract: In the UNIX/Linux environment the kernel can log every command process created by every user with process accounting. Thus process accounting logs have many potential uses, particularly the monitoring and forensic investigation of security events. Previous work successfully leveraged the use of process accounting logs to identify a difficult to detect and damaging intrusion against high performa… ▽ More

    Submitted 20 June, 2006; originally announced June 2006.

    Comments: 25 pages, 13 Figures

  5. arXiv:cs/0603114  [pdf

    cs.NI cs.CR

    Using SMART for Customized Monitoring of Windows Services

    Authors: Gregory A. Pluta, Larry Brumbaugh, William Yurcik

    Abstract: We focus on examining and working with an important category of computer software called Services, which are provided as a part of newer Microsoft Windows operating systems. A typical Windows user transparently utilizes many of these services but is frequently unaware of their existence. Since some services have the potential to create significant problems when they are executing, it is importan… ▽ More

    Submitted 29 March, 2006; originally announced March 2006.

    Comments: 15 pages, 10 figures, 2 tables

  6. arXiv:cs/0601079  [pdf

    cs.CR

    SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting

    Authors: Katherine Luo, Yifan Li, Charis Ermopoulos, William Yurcik, Adam Slagell

    Abstract: In the UNIX/Linux environment the kernel can log every command process created by every user using process accounting. This data has many potential uses, including the investigation of security incidents. However, process accounting data is also sensitive since it contains private user information. Consequently, security system administrators have been hindered from sharing these logs. Given tha… ▽ More

    Submitted 17 January, 2006; originally announced January 2006.

    Comments: 19 pages, 11 figures, 4 tables

  7. arXiv:cs/0601020  [pdf

    cs.CR cs.CY

    The Evolution of Cyberinsurance

    Authors: Ruperto P. Majuca, William Yurcik, Jay P. Kesan

    Abstract: Cyberinsurance is a powerful tool to align market incentives toward improving Internet security. We trace the evolution of cyberinsurance from traditional insurance policies to early cyber-risk insurance policies to current comprehensive cyberinsurance products. We find that increasing Internet security risk in combination with the need for compliance with recent corporate legislation has contri… ▽ More

    Submitted 6 January, 2006; originally announced January 2006.

    Comments: 16 pages, 6 tables, 2 figures

    ACM Class: K.6.5

  8. arXiv:cs/0510046  [pdf, ps, other

    cs.CR cs.DC

    Defining a Comprehensive Threat Model for High Performance Computational Clusters

    Authors: Dmitry Mogilevsky, Adam Lee, William Yurcik

    Abstract: Over the past decade, high performance computational (HPC) clusters have become mainstream in academic and industrial settings as accessible means of computation. Throughout their proliferation, HPC security has been a secondary concern to performance. It is evident, however, that ensuring HPC security presents different challenges than the ones faced when dealing with traditional networks. To d… ▽ More

    Submitted 16 October, 2005; originally announced October 2005.

  9. arXiv:cs/0509095  [pdf

    cs.NI cs.CY

    Leveraging Social-Network Infrastructure to Improve Peer-to-Peer Overlay Performance: Results from Orkut

    Authors: Zahid Anwar, William Yurcik, Vivek Pandey, Asim Shankar, Indranil Gupta, Roy H. Campbell

    Abstract: Application-level peer-to-peer (P2P) network overlays are an emerging paradigm that facilitates decentralization and flexibility in the scalable deployment of applications such as group communication, content delivery, and data sharing. However the construction of the overlay graph topology optimized for low latency, low link and node stress and lookup performance is still an open problem. We pr… ▽ More

    Submitted 28 September, 2005; originally announced September 2005.

    Comments: 9 pages 8 figures

    ACM Class: C.2.2

  10. arXiv:cs/0506038  [pdf, ps, other

    cs.GT

    A Game Theoretic Economics Framework to understanding Information Security Oursourcing Market

    Authors: Wen Ding, William Yurcik

    Abstract: On information security outsourcing market, an important reason that firms do not want to let outside firms(usually called MSSPs-Managed Security Service Providers) to take care of their security need is that they worry about service quality MSSPs provide because they cannot monitor effort of the MSSPs. Since MSSPs action is unobservable to buyers, MSSPs can lower cost by working less hard than… ▽ More

    Submitted 10 June, 2005; originally announced June 2005.

    Comments: 16 pages, 2 figures

  11. arXiv:cs/0412121  [pdf, ps, other

    cs.DC

    A Distributed Economics-based Infrastructure for Utility Computing

    Authors: Michael Treaster, Nadir Kiyanclar, Gregory A. Koenig, William Yurcik

    Abstract: Existing attempts at utility computing revolve around two approaches. The first consists of proprietary solutions involving renting time on dedicated utility computing machines. The second requires the use of heavy, monolithic applications that are difficult to deploy, maintain, and use. We propose a distributed, community-oriented approach to utility computing. Our approach provides an infras… ▽ More

    Submitted 31 December, 2004; originally announced December 2004.

    Comments: 8 pages, 1 figure

  12. arXiv:cs/0409005  [pdf, ps, other

    cs.CR

    Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization

    Authors: Adam J. Slagell, William Yurcik

    Abstract: Logs are one of the most fundamental resources to any security professional. It is widely recognized by the government and industry that it is both beneficial and desirable to share logs for the purpose of security research. However, the sharing is not happening or not to the degree or magnitude that is desired. Organizations are reluctant to share logs because of the risk of exposing sensitive… ▽ More

    Submitted 3 September, 2004; originally announced September 2004.

    Comments: 17 pages, 1 figure

    ACM Class: K.6.5

  13. arXiv:cs/0109078  [pdf

    cs.CY

    Internet Attacks: A Policy Framework for Rules of Engagement

    Authors: William Yurcik, David Doss

    Abstract: Information technology is redefining national security and the use of force by state and nonstate actors. The use of force over the Internet warrants analysis given recent terrorist attacks. At the same time that information technology empowers states and their commercial enterprises, information technology makes infrastructures supported by computer systems increasingly accessible, interdepende… ▽ More

    Submitted 24 September, 2001; originally announced September 2001.

    Comments: 29th TPRC Conference, 2001 19 pages

    Report number: TPRC-2001-089 ACM Class: K.4.m Miscellaneous