
200 S Laurel Ave - Bldg C
Middletown, NJ
http://billwinkle.wordpress.com/
Subject matter expert in System architecture, Network security, Software development
Develop system architecture and software solutions. Extensive work experience in network security. Experience includes risk analysis, networked security solutions, software solutions and working with customers. Significant experience in both software and network equipment testing.
Specialties:
System architecture, System analysis and design, Network security, Database design, Java programming, Software testing, Network testing
Botnet-Originated DDoS Attacks and Their Mitigation -- A New Spiral in the Arms Race on the Internet
William Beckett, T Jayawardena
Global Science and Technology Forum,
2011.
[DOC]
[BIB]
Global Science and Technology Forum Copyright
The definitive version was published in Global Science and Technology Forum. , 2011-11-25
{Abstract�The Internet has transformed how people interact and transact day-to-day activities in less than a single human generation. The rate of this transformation will only increase with the on-going innovations in mobile networks and devices. However, a limiting factor of adoption of innovation is the concern about Internet security. Thus, for the continuation of the transformative function of the Internet it is critical that Internet security itself is transformed to play a facilitating role from its current limiting role.
Even as the current Internet evolves to a more secure future Internet several trends we see today will likely remain. One of them is the �arms race� between attacker and defender in cyberspace. We describe a new spiral in such an arms race in the current Internet, namely, DDoS attacks originating from botnets and their mitigation in large provider networks using BGP flow specification, a new dynamic, real-time traffic filtering capability described in RFC 5575.
}
Methods, Devices and Computer Program Products For Regulating Network Activity Using A Subscriber Scoring System,
Tue Sep 25 12:53:41 EDT 2012
Network activity in a network is regulated. Network activity scores that correspond to network usage patterns for respective network users are calculated. A network user is assigned into one of multiple risk classes responsive to a respective one of the network activity scores. A subsequent action is selected responsive to which of the risk classes the network user is assigned.
Virtualized Policy Tester,
Tue Jul 03 12:52:40 EDT 2012
Embodiments of the present invention are directed to testing policy changes associated with a production network. A virtual network that represents at least a portion of the production network can be generated. A first transaction log based on a first execution of the virtual network using test traffic and a first set of policies that are implemented in the production network can be obtained. A second transaction log based on a second execution of the virtual network using the test traffic and a second set of policies to be implemented in the production network can be obtained. Based on a comparison of the first and second transaction logs, it can be determined whether the second set of policies has a desired effect in the virtual network.
Method And Apparatus For Adjusting A Network Device Configuration Change Distribution Schedule,
Tue Dec 07 15:05:09 EST 2010
The invention comprises a method and apparatus for adjusting a distribution schedule controlling distribution of network device configuration changes associated with a plurality of network devices. Specifically, the method comprises determining a distribution status of the distribution of network device configuration changes, comparing the distribution status to the distribution schedule, and adjusting the distribution schedule in response to a difference between the distribution schedule and the distribution status.
Device Emulation For Testing Data Network Configurations,
Tue Jun 30 16:07:32 EDT 2009
A system and method for providing a virtual implementation of a large scale network of devices. The invention emulates an entire network of network devices using the configuration information obtained from the actual devices to meet the needs of testing configuration changes across the entire network.