Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Alan Boulanger is active.

Publication


Featured researches published by Alan Boulanger.


Ibm Systems Journal | 2005

Open-source versus proprietary software: is one more reliable and secure than the other?

Alan Boulanger

One of the most powerful movements in the information technology community today is the widespread adoption of free and open-source software (FOSS). What was once an idealistic fringe movement conceived and formalized by MacArthur award laureate Richard Stallman has now become one of the most powerful influences in the world of information technology. As FOSS systems grow in popularity, questions of the reliability and security of these systems emerge, especially in comparison with proprietary systems. This paper surveys the arguments presented by proponents of each type of software in published reports and discusses the deployment and reliability figures for both FOSS and proprietary systems as well.


Ibm Systems Journal | 1998

Catapults and grappling hooks: the tools and techniques of information warfare

Alan Boulanger

For years, “hackers” have broken into computer systems, and now an entire industry is dedicated to computer network security. Both hackers and computer security professionals have developed software tools for either breaking into systems or identifying potential security problems within computer networks. This software can be found on compromised systems as well as within the toolkits of legitimate “tiger” teams that operate with the consent of the network owners. This paper describes some of the current techniques and tools employed by the hacker underground in breaching the security of networked computers, focusing primarily on UNIX®-based hosts connected to TCP/IP networks.


Archive | 2004

Apparatus, method and program to detect and control deleterious code (virus) in computer network

Alan Boulanger; Robert William Danford; Kevin David Himberger; Clark Debs Jeffries


Archive | 2003

Method, program and system for automatically detecting malicious computer network reconnaissance

Alan Boulanger; Robert William Danford; Kevin David Himberger; Clark Debs Jeffries; Raj K. Singh


Archive | 2008

Automatically detecting malicious computer network reconnaissance by updating state codes in a histogram

Alan Boulanger; Robert William Danford; Kevin David Himberger; Clark Debs Jeffries; Raj K. Singh


Archive | 2004

Method, system and program for automatically detecting distributed port scans in computer networks

Alan Boulanger; Robert William Danford; Kevin David Himberger; Clark Debs Jeffries


Archive | 2004

Methods, systems, and computer program products for operating a communication network through use of blocking measures for responding to communication traffic anomalies

Alan Boulanger; Kevin David Himberger; Clark Debs Jeffries; John Ziraldo


Archive | 2004

Automatically detecting distributed port scans in computer networks

Alan Boulanger; Robert William Danford; Kevin David Himberger; Clark Debs Jeffries


Archive | 2004

Operating a communication network through use of blocking measures for responding to communication traffic anomalies

Alan Boulanger; Kevin David Himberger; Clark Debs Jeffries; John Ziraldo


Archive | 2005

Method, system and computer program for detecting unauthorised scanning on a network

Alan Boulanger; Robert William Danford; Kevin David Himberger; Clark Debs Jeffries

Collaboration


Dive into the Alan Boulanger's collaboration.

Researchain Logo
Decentralizing Knowledge