Adnan Baykal - Academia.edu (original) (raw)

Uploads

Papers by Adnan Baykal

Research paper thumbnail of Innovative model for information assurance curriculum

Journal on Educational Resources in Computing, 2006

A novel idea for information security education created by the New York State Center for Informat... more A novel idea for information security education created by the New York State Center for Information Forensics and Assurance (CIFA) is presented. This new approach incorporates a teaching hospital model originally developed for medical training. In this model, information security problems from industry and government are solved and abstracted into living-cases used for training and education of university students and public-sector employees. Such a model helps ensure that the curriculum stays current even as the field of information assurance continues to evolve. Solving industry problems hones research skills, while exposing students to living cases helps build context for concepts in information assurance. The success of this approach is contingent upon strong partnerships with government and private organizations that have real security issues as well as an active research program in information security that involves faculty and students. This article presents an implementatio...

Research paper thumbnail of A linux kernel auditing tool for host-based intrusion detection

Proc. of the IEEE Annual …

Abstract—Intrusion detection and response are critical in modern computing environments. In this ... more Abstract—Intrusion detection and response are critical in modern computing environments. In this paper, we focus on host-based intrusion detection, since once an intruder gains access it is very important to know what they did, how they did it and to formulate what recovery ...

Research paper thumbnail of Botnets: the anatomy of a case

Journal of Information Systems Security (accepted)

Botnets have become the dominant mechanism for launching distributed denial-of-service attacks on... more Botnets have become the dominant mechanism for launching distributed denial-of-service attacks on computer networks. In a recent incident, the computer network of an organization was attacked and disabled. This attack was initially identified by intrusion detection devices and verified ...

Research paper thumbnail of Innovative model for information assurance curriculum

Journal on Educational Resources in Computing, 2006

A novel idea for information security education created by the New York State Center for Informat... more A novel idea for information security education created by the New York State Center for Information Forensics and Assurance (CIFA) is presented. This new approach incorporates a teaching hospital model originally developed for medical training. In this model, information security problems from industry and government are solved and abstracted into living-cases used for training and education of university students and public-sector employees. Such a model helps ensure that the curriculum stays current even as the field of information assurance continues to evolve. Solving industry problems hones research skills, while exposing students to living cases helps build context for concepts in information assurance. The success of this approach is contingent upon strong partnerships with government and private organizations that have real security issues as well as an active research program in information security that involves faculty and students. This article presents an implementatio...

Research paper thumbnail of A linux kernel auditing tool for host-based intrusion detection

Proc. of the IEEE Annual …

Abstract—Intrusion detection and response are critical in modern computing environments. In this ... more Abstract—Intrusion detection and response are critical in modern computing environments. In this paper, we focus on host-based intrusion detection, since once an intruder gains access it is very important to know what they did, how they did it and to formulate what recovery ...

Research paper thumbnail of Botnets: the anatomy of a case

Journal of Information Systems Security (accepted)

Botnets have become the dominant mechanism for launching distributed denial-of-service attacks on... more Botnets have become the dominant mechanism for launching distributed denial-of-service attacks on computer networks. In a recent incident, the computer network of an organization was attacked and disabled. This attack was initially identified by intrusion detection devices and verified ...

Log In