Arun Sood | George Mason University (original) (raw)

Address: Fairfax, Virginia, United States

less

Uploads

Papers by Arun Sood

Research paper thumbnail of Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT

Research paper thumbnail of Closing Cluster Attack Windows Through Server Redundancy and Rotations

Research paper thumbnail of SCIT-DNS: Critical infrastructure protection through secure DNS server dynamic updates

Journal of High Speed Networks, 2006

Research paper thumbnail of Incorruptible system self-cleansing for intrusion tolerance

Research paper thumbnail of Countering Web Defacing Attacks with System Self Cleansing

Research paper thumbnail of Securing DNS Services through System Self Cleansing and Hardware Enhancements

Research paper thumbnail of Self-Cleansing Systems for Intrusion Containment

ABSTRACT In this paper, we discuss the application of high-availability computing systems to intr... more ABSTRACT In this paper, we discuss the application of high-availability computing systems to intrusion containment. Intrusion Management Systems (IMS) serve to protect complex computer systems from unauthorized intrusions. The traditional IMS approaches rely on intrusion ...

Research paper thumbnail of Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES

Research paper thumbnail of Quantitative Approach to Tuning of a Time-Based Intrusion-Tolerant System Architecture

Research paper thumbnail of Segmentation of brain tumors in 4D MR images using the hidden Markov model

Computer Methods and Programs in Biomedicine, 2006

Research paper thumbnail of Developing an Ontology and ACL in an Agent-based GIS

Research paper thumbnail of A light-weight agent approach for collaborative multi-media systems

Research paper thumbnail of An Agent-based Architecture for Distributed Imagery & Geospatial Computing

Research paper thumbnail of Integrated Admission Control in Hierarchical Video-on-Demand Systems

We develop a unified model of a hierarchical video-on-demand (VoD) system by integrating the stor... more We develop a unified model of a hierarchical video-on-demand (VoD) system by integrating the storage and the network subsystems. Rather than restricting the analysis to an isolated subsystem the performance of the VoD system is analyzed as an end-to-end system. On a system-wide basis, request handling and admission control policies are designed to minimize global performance metrics. Through our simulation, we compare different request handling policies and show that a hierarchical VoD architecture with request handling that allows retrials at more than one resource will minimize overall blocking

Research paper thumbnail of END-TO-END REQUEST HANDLING IN DISTRIBUTED VIDEO-ON-DEMAND SYSTEMS

In this paper we provide an end-to-end analysis of a dis-tributed Video-on-Demand system consisti... more In this paper we provide an end-to-end analysis of a dis-tributed Video-on-Demand system consisting of a hierarchy of server clusters and networks. We develop an analyti-cal framework for remote service by combining two crit-ical subsystems, the storage and the network subsystems. ...

Research paper thumbnail of Threshold-based admission control for multi-class video-on-demand systems

Research paper thumbnail of End-to-end analysis of distributed video-on-demand systems

IEEE Transactions on Multimedia, 2004

Research paper thumbnail of Class-based access control for distributed video-on-demand systems

IEEE Transactions on Circuits and Systems for Video Technology, 2005

Research paper thumbnail of Network Delay Jitter and Client Buffer Requirements in Distributed Video-on-Demand Systems

In this paper, we analyze the effects of delay jitter on receiver buffer requirements in distribu... more In this paper, we analyze the effects of delay jitter on receiver buffer requirements in distributed Video-on-Demand systems. We use a general purpose real-time producer-consumer model to describe the dis-tributed architecture of a Video-on-Demand system. We prove a ...

Research paper thumbnail of Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT

Research paper thumbnail of Closing Cluster Attack Windows Through Server Redundancy and Rotations

Research paper thumbnail of SCIT-DNS: Critical infrastructure protection through secure DNS server dynamic updates

Journal of High Speed Networks, 2006

Research paper thumbnail of Incorruptible system self-cleansing for intrusion tolerance

Research paper thumbnail of Countering Web Defacing Attacks with System Self Cleansing

Research paper thumbnail of Securing DNS Services through System Self Cleansing and Hardware Enhancements

Research paper thumbnail of Self-Cleansing Systems for Intrusion Containment

ABSTRACT In this paper, we discuss the application of high-availability computing systems to intr... more ABSTRACT In this paper, we discuss the application of high-availability computing systems to intrusion containment. Intrusion Management Systems (IMS) serve to protect complex computer systems from unauthorized intrusions. The traditional IMS approaches rely on intrusion ...

Research paper thumbnail of Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES

Research paper thumbnail of Quantitative Approach to Tuning of a Time-Based Intrusion-Tolerant System Architecture

Research paper thumbnail of Segmentation of brain tumors in 4D MR images using the hidden Markov model

Computer Methods and Programs in Biomedicine, 2006

Research paper thumbnail of Developing an Ontology and ACL in an Agent-based GIS

Research paper thumbnail of A light-weight agent approach for collaborative multi-media systems

Research paper thumbnail of An Agent-based Architecture for Distributed Imagery & Geospatial Computing

Research paper thumbnail of Integrated Admission Control in Hierarchical Video-on-Demand Systems

We develop a unified model of a hierarchical video-on-demand (VoD) system by integrating the stor... more We develop a unified model of a hierarchical video-on-demand (VoD) system by integrating the storage and the network subsystems. Rather than restricting the analysis to an isolated subsystem the performance of the VoD system is analyzed as an end-to-end system. On a system-wide basis, request handling and admission control policies are designed to minimize global performance metrics. Through our simulation, we compare different request handling policies and show that a hierarchical VoD architecture with request handling that allows retrials at more than one resource will minimize overall blocking

Research paper thumbnail of END-TO-END REQUEST HANDLING IN DISTRIBUTED VIDEO-ON-DEMAND SYSTEMS

In this paper we provide an end-to-end analysis of a dis-tributed Video-on-Demand system consisti... more In this paper we provide an end-to-end analysis of a dis-tributed Video-on-Demand system consisting of a hierarchy of server clusters and networks. We develop an analyti-cal framework for remote service by combining two crit-ical subsystems, the storage and the network subsystems. ...

Research paper thumbnail of Threshold-based admission control for multi-class video-on-demand systems

Research paper thumbnail of End-to-end analysis of distributed video-on-demand systems

IEEE Transactions on Multimedia, 2004

Research paper thumbnail of Class-based access control for distributed video-on-demand systems

IEEE Transactions on Circuits and Systems for Video Technology, 2005

Research paper thumbnail of Network Delay Jitter and Client Buffer Requirements in Distributed Video-on-Demand Systems

In this paper, we analyze the effects of delay jitter on receiver buffer requirements in distribu... more In this paper, we analyze the effects of delay jitter on receiver buffer requirements in distributed Video-on-Demand systems. We use a general purpose real-time producer-consumer model to describe the dis-tributed architecture of a Video-on-Demand system. We prove a ...

Log In