Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Eric Eilertson is active.

Publication


Featured researches published by Eric Eilertson.


PROCEEDINGS OF SPIE SPIE - The International Society for Optical Engineering:Battlespace Digitization and Network-Centric Systems III | 2003

Protecting against cyber threats in networked information systems

Levent Ertoz; Aleksandar Lazarevic; Eric Eilertson; Pang Ning Tan; Paul Dokas; Vipin Kumar; Jaideep Srivastava

This paper provides an overview of our efforts in detecting cyber attacks in networked information systems. Traditional signature based techniques for detecting cyber attacks can only detect previously known intrusions and are useless against novel attacks and emerging threats. Our current research at the University of Minnesota is focused on developing data mining techniques to automatically detect attacks against computer networks and systems. This research is being conducted as a part of MINDS (Minnesota Intrusion Detection System) project at the University of Minnesota. Experimental results on live network traffic at the University of Minnesota show that the new techniques show great promise in detecting novel intrusions. In particular, during the past few months our techniques have been successful in automatically identifying several novel intrusions that could not be detected using state-of-the-art tools such as SNORT.


Archive | 2007

Minds: Architecture & Design

Varun Chandola; Eric Eilertson; Levent Ertoz; Gyorgy Simon; Vipin Kumar

This chapter provides an overview of the Minnesota Intrusion Detection System (MINDS), which uses a suite of data mining based algorithms to address different aspects of cyber security. The various components of MINDS such as the scan detector, anomaly detector and the profiling module detect different types of attacks and intrusions on a computer network. The scan detector aims at detecting scans which are the percusors to any network attack. The anomaly detection algorithm is very effective in detecting behavioral anomalies in the network traffic which typically translate to malicious activities such as denial-of-service (DoS) traffic, worms, policy violations and inside abuse. The profiling module helps a network analyst to understand the characteristics of the network traffic and detect any deviations from the normal profile. Our analysis shows that the intrusions detected by HINDS are complementary to those of traditional signature based systems, such as SNORT, which implies that they both can be combined to increase overall attack coverage. MINDS has shown great operational success in detecting network intrusions in two live deployments at the University of Minnesota and as a part of the Interrogator architecture at the US Army Research Lab — Center for Intrusion Monitoring and Protection (ARL-CIMP).


international conference on conceptual structures | 2007

DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing

Jon B. Weissman; Vipin Kumar; Varun Chandola; Eric Eilertson; Levent Ertoz; Gyorgy Simon; Seonho Kim; Jinoh Kim

We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application - the Minnesota Intrusion Detection System (MINDS), which uses a suite of data mining based algorithms to address different aspects of cyber security including malicious activities such as denial-of-service (DoS) traffic, worms, policy violations and inside abuse. MINDS has shown great operational success in detecting network intrusions in several real deployments. In sophisticated distributed cyber attacks using a multitude of wide-area nodes, combining the results of several MINDS instances can enable additional early-alert cyber security. We also describe a Grid service system that can deploy and manage multiple MINDS instances across a wide-area network.


siam international conference on data mining | 2003

Detection of Novel Network Attacks Using Data Mining

Levent Ertoz; Eric Eilertson; Aleksandar Lazarevic; Pang Ning Tan; Paul Dokas; Vipin Kumar; Jaideep Srivastava


siam international conference on data mining | 2006

Scan detection: A data mining approach

György J. Simon; Hui Xiong; Eric Eilertson; Vipin Kumar


Archive | 2006

Detection of Multi-Step Computer Processes Such as Network Intrusions

Varun Chandola; Eric Eilertson; Haiyang Liu; Mark Shaneck; Changho Choi; Gyoergy Simon; Yongdae Kim; Vipin Kumar; Jaideep Srivastava; Zhi Li Zhang


Archive | 2006

Data Mining for Cyber Security

Varun Chandola; Eric Eilertson; Levent Ertoz; Gyorgy Simon


Archive | 2003

Detection and Summarization of Novel Network Attacks Using Data Mining

Levent Ertoz; Eric Eilertson; Aleksandar Lazarevic; Pang Ning Tan; Paul Dokas; Vipin Kumar; Jaideep Srivastava


Archive | 2005

Situational Awareness Analysis Tools for Aiding Discovery of Security Events and Patterns

Vipin Kumar; Yongdae Kim; Jaideep Srivastava; Zhi Li Zhang; Mark Shaneck; Varun Chandola; Haiyang Liu; Changho Choi; Gyorgy Simon; Eric Eilertson


Scopus | 2007

Minds: Architecture and design

Varun Chandola; Eric Eilertson; Levent Ertoz; Gyorgy Simon; Vipin Kumar

Collaboration


Dive into the Eric Eilertson's collaboration.

Top Co-Authors

Avatar

Vipin Kumar

University of Minnesota

View shared research outputs
Top Co-Authors

Avatar

Levent Ertoz

University of Minnesota

View shared research outputs
Top Co-Authors

Avatar

Gyorgy Simon

University of Minnesota

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jaideep Srivastava

Qatar Computing Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Pang Ning Tan

Michigan State University

View shared research outputs
Top Co-Authors

Avatar

Paul Dokas

University of Minnesota

View shared research outputs
Top Co-Authors

Avatar

Zhi Li Zhang

University of Minnesota

View shared research outputs
Top Co-Authors

Avatar

Haiyang Liu

University of Minnesota

View shared research outputs
Researchain Logo
Decentralizing Knowledge