Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Darrell Kienzle is active.

Publication


Featured researches published by Darrell Kienzle.


hawaii international conference on system sciences | 2010

Endpoint Configuration Compliance Monitoring via Virtual Machine Introspection

Darrell Kienzle; Ryan Persaud; Matthew C. Elder

We describe a system for externally monitoring endpoint configuration compliance of an end user system that provides a high assurance monitoring function and data. Typical approaches to monitoring for endpoint configuration compliance rely on the integrity of the endpoints operating system and do not protect the monitoring function from subversion or spoofing by threats from within the monitored system. Our approach utilizes (1) a virtual machine architecture on the endpoint system to protect the monitoring function and (2) virtual machine introspection of the end users environment. In this paper we describe our approach to external monitoring of endpoint configuration compliance, present the technical details of our monitoring system, provide a description of some experimentation and observations, and discuss some of the issues associated with external monitoring.


communications and networking symposium | 2013

NICE: Network Introspection by Collaborating Endpoints

Darrell Kienzle; Nathan S. Evans; Matthew C. Elder

NICE, or Network Introspection by Collaborating Endpoints, is a research project that explores novel approaches to network discovery and topology mapping in enterprise networks. The goal of NICE is to develop and demonstrate a capability for mapping networks without relying on traditional network management tools and protocols (such as SNMP), which presume some knowledge of the network topology a priori and require administrative credentials to managed network devices in order to collect their data. NICE targets the security administrator - who does not have either the knowledge or authority to manage the network infrastructure - as opposed to the network administrator. The security administrator does have authority to manage client security software on every managed endpoint. By leveraging this presence on the endpoints, NICE attempts to extract the security-relevant network information that the security administrator needs in order to prevent, ameliorate, and respond to security incidents. The NICE project consists of research and development in multiple areas. NICE uses low-level network switch properties to locate and map all the switches on a subnet and then associate rogue systems with specific physical switches. NICE also captures a wealth of information about rogue systems, authorized systems/devices, and topology simply by listening to broadcast traffic. Lastly, NICE explores techniques for having pairs of endpoints talk across the network to infer the presence of intermediate devices and processing. We have produced a NICE integrated system prototype addressing these research areas and conducted some experimentation to evaluate the effectiveness and scalability of the approach.


Proceedings of the 9th Annual Cyber and Information Security Research Conference on | 2014

NICE: endpoint-based topology discovery

Darrell Kienzle; Nathan S. Evans; Matthew C. Elder

We present a novel method of layer 2 network topology discovery for Ethernet LANs through the coordinated operation of endpoints/hosts, part of a research project called NICE (Network Introspection by Collaborating Endpoints). Networks are constantly changing, including Ethernet LANs -- machines come and go, network hardware fails, switches are rewired, equipment is reconfigured. The layer 2 network represents a moving target, both for the attacker and the defender alike. It is necessary to understand the network, both before and during these changes. Existing network management approaches based on collecting and correlating SNMP data from managed layer 2 devices cannot see the complete picture of the network and cannot see all changes as they occur, in particular changes related to unmanaged devices. NICE is able discover more information about the topology, including unmanaged devices, without the assistance of traditional network management tools and protocols. NICE requires no administrative access to networking hardware, is multi-platform, and discovers both consumer and enterprise layer 2 devices. The novel contributions of this paper include a layer 2 mapping protocol that does not require SNMP access nor MAC address spoofing, and a working method to discover and locate non-NICE devices in the topology, improving upon existing research. We have performed extensive experimentation to validate our techniques and provide a comparison to existing research.


cyber security and information intelligence research workshop | 2009

External monitoring of endpoint configuration compliance

Darrell Kienzle; Ryan Persaud; Matthew C. Elder

We describe a system for externally monitoring endpoint configuration compliance of an end user system that provides a high assurance monitoring function and data. Typical approaches to monitoring for endpoint configuration compliance rely on the integrity of the endpoints operating system and do not protect the monitoring function from subversion or spoofing by threats from within the monitored system. Our approach utilizes (1) a virtual machine architecture on the endpoint system to protect the monitoring function and (2) virtual machine introspection of the end users environment. In this paper we describe our approach to external monitoring of endpoint configuration compliance, present the technical details of our monitoring system, and discuss some of the issues associated with external monitoring.


Archive | 2006

Efficient backups using dynamically shared storage pools in peer-to-peer networks

Michael Spertus; Slava Kritov; Darrell Kienzle; Hans F. van Rietschote; Anthony T. Orling; William E. Sobel


workshop on rapid malcode | 2003

Recent worms: a survey and trends

Darrell Kienzle; Matthew C. Elder


Archive | 2005

Preventing data from being submitted to a remote system in response to a malicious e-mail

Darrell Kienzle; James Croall


Archive | 2010

System and method for vulnerability risk analysis

Matthew C. Elder; Darrell Kienzle; Pratyusa K. Manadhata; Ryan Persaud


Archive | 2005

Validation of secure sockets layer communications

Darrell Kienzle; Matthew C. Elder


international conference on distributed computing systems workshops | 2012

The MEERKATS Cloud Security Architecture

Angelos D. Keromytis; Roxana Geambasu; Simha Sethumadhavan; Salvatore J. Stolfo; Junfeng Yang; Azzedine Benameur; Marc Dacier; Matthew C. Elder; Darrell Kienzle; Angelos Stavrou

Collaboration


Dive into the Darrell Kienzle's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge