Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Walter Heimerdinger is active.

Publication


Featured researches published by Walter Heimerdinger.


darpa information survivability conference and exposition | 2001

Information modeling for intrusion report aggregation

Robert P. Goldman; Walter Heimerdinger; Steven A. Harp; Christopher W. Geib; Vicraj T. Thomas; Robert L. Carter

The paper describes the SCYLLARUS approach to fusing reports from multiple intrusion detection systems (ID-Ses) to provide an overall approach to intrusion situation awareness. The overall view provided by SCYLLARUS centers around the sites security goals, aggregating large numbers of individual IDS reports based on their impact. The overall view reduces information overload by aggregating multiple IDS reports in a rep-down view; and by reducing false positives by weighing evidence provided by multiple ID-Ses and other information sources. Unlike previous efforts in this area, SCYLLARUS is centered around its intrusion reference model (IRM). The SCYLLARUS IRM contains both dynamic and static (configuration) information. A network entity/relationship database (NERD), providing information about the sites hardware and software; a security goal database, describing the sites objectives and security policy; and an event dictionary, describing important events, both intrusions and benign; comprise the static portion of the IRM. The set of IDS reports; the events SCYLLARUS hypothesizes to explain them; and the resulting judgment of the state of site security goals comprise the dynamic part of the IRM.


darpa information survivability conference and exposition | 2003

Scyllarus intrusion detection report correlator and analyzer

Walter Heimerdinger

Scyllarus is technology developed in the Argus project, part of the DARPA Cyber Panel program. Scyllarus uses a dynamic evidence aggregator (DEA) to combine results from multiple intrusion detectors to reduce the false alarm rate and decrease the time required to detect an intrusion. This technology includes Bayesian estimation networks and a calculus based on qualitative probability. The DEA relies upon a knowledge base called the Intrusion Reference Model, containing information about the protected network, its configuration, installed intrusion detection systems (IDSs), and related security goals.


international conference on data engineering | 1984

DCT — A testbed approach to distributed systems research

Walter Heimerdinger; Devesh Bhatt

The rationale and conceptual design 1s presented for the Distributed Computer Testbed (DCT), currently being developed at Honeywells Systems and Research Center. The DCT 1s a highly reconfigurable and Instrumented tool that will allow experimentation 1n a variety of distributed computing areas, ranging from performance evaluation of media access protocols to concept validation of distributed fault-tolerance strategies. Work 1s continuing on the detailed design and Implementation of DCT.


Proceedings of the Sagamore Computer Conference on Parallel Processing | 1974

Architectural Considerations in Interfacing a Parallel Processor to the Air Traffic Control System

Walter Heimerdinger; G. F. Muething; S. J. Nuspl; L. B. Wing

Interfacing of parallel processors and other special purpose computers to a general purpose host is a very important consideration in effectively using these processors. This paper describes how a parallel processor configuration is connected to a host machine, in this case an ARTS III(a) multiprocessor system. The constraints leading to the configuration are first presented. Then we give descriptions of the matched hardware and software interfaces which ensure that the full capabilities of the processors can be utilized and that the cost and risk of developing the system is minimized. This paper presents only one experience in designing a parallel processor to host computer interface, but some of the considerations encountered in this experience will be applicable to other such interface attempts.


Archive | 2005

Physical security management system

Thomas R. Markham; Walter Heimerdinger


Archive | 2004

Intrusion detection report correlator and analyzer

Walter Heimerdinger; Jon Schewe


Archive | 2006

Audio-based presentation system

Thomas A. Plocher; Jeffrey M. Rye; Steve D. Huseth; Walter Heimerdinger


Archive | 2005

Anomaly-based intrusion detection

Walter Heimerdinger; Valerie Guralnik; Ryan VanRiper


Archive | 2003

Intelligibility measurement of audio announcement systems

Charles R. Obranovich; Philip J. Zumsteg; Andrew G. Berezowski; Walter Heimerdinger; John Phelps


Archive | 2005

Methods and systems for intelligibility measurement of audio announcement systems

Charles R. Obranovich; Philip J. Zumsteg; Andrew G. Berezowski; Walter Heimerdinger; John Phelps; D. Shields

Collaboration


Dive into the Walter Heimerdinger's collaboration.

Researchain Logo
Decentralizing Knowledge