Chad R. Meiners
YOU?
Author Swipe
View article: Hypersparse Network Flow Analysis of Packets with GraphBLAS
Hypersparse Network Flow Analysis of Packets with GraphBLAS Open
Internet analysis is a major challenge due to the volume and rate of network traffic. In lieu of analyzing traffic as raw packets, network analysts often rely on compressed network flows (netflows) that contain the start time, stop time, s…
View article: Large Scale Enrichment and Statistical Cyber Characterization of Network Traffic (Enriquecimiento a gran escala y caracterización cibernética estadística del tráfico de red)
Large Scale Enrichment and Statistical Cyber Characterization of Network Traffic (Enriquecimiento a gran escala y caracterización cibernética estadística del tráfico de red) Open
Modern network sensors continuously produce enormous quantities of raw data that are beyond the capacity of human analysts. Cross-correlation of network sensors increases this challenge by enriching every network event with additional meta…
View article: Temporal Correlation of Internet Observatories and Outposts
Temporal Correlation of Internet Observatories and Outposts Open
The Internet has become a critical component of modern civilization requiring scientific exploration akin to endeavors to understand the land, sea, air, and space environments. Understanding the baseline statistical distributions of traffi…
View article: GraphBLAS on the Edge: Anonymized High Performance Streaming of Network Traffic
GraphBLAS on the Edge: Anonymized High Performance Streaming of Network Traffic Open
Long range detection is a cornerstone of defense in many operating domains (land, sea, undersea, air, space, ..,). In the cyber domain, long range detection requires the analysis of significant network traffic from a variety of observatori…
View article: Zero Botnets: An Observe-Pursue-Counter Approach
Zero Botnets: An Observe-Pursue-Counter Approach Open
Adversarial Internet robots (botnets) represent a growing threat to the safe use and stability of the Internet. Botnets can play a role in launching adversary reconnaissance (scanning and phishing), influence operations (upvoting), and fin…
View article: Realizing Forward Defense in the Cyber Domain
Realizing Forward Defense in the Cyber Domain Open
With the recognition of cyberspace as an operating domain, concerted effort is now being placed on addressing it in the whole-of-domain manner found in land, sea, undersea, air, and space domains. Among the first steps in this effort is ap…