scispace - formally typeset
J

John A. Copeland

Researcher at Georgia Institute of Technology

Publications -  238
Citations -  5932

John A. Copeland is an academic researcher from Georgia Institute of Technology. The author has contributed to research in topics: Wireless network & Quality of service. The author has an hindex of 37, co-authored 238 publications receiving 5789 citations. Previous affiliations of John A. Copeland include California Institute of Technology & Bell Labs.

Papers
More filters
Patent

Network port profiling

TL;DR: In this article, a port profiling system analyzes network communications to determine the service ports being used and if the observed network service is not one of the normal network services performed as defined by the port profile, an alarm signal is generated (630) and action can be taken based upon the detection of an Out of Profile network service (610).
Patent

Packet sampling flow-based detection of network intrusions

TL;DR: A flow-based intrusion detection sy stem for detecting intrusions in computer-to-computer communication networks is proposed in this article, where the flow statistics are analyzed to determine if the flow appears to be legitimate traffic or possible suspicious activity.
Patent

Flow-based detection of network intrusions

TL;DR: A flow-based intrusion detection system for detecting intrusions in computer communication networks is presented in this paper, where data packets representing communications between hosts in a computer-to-computer communication network are processed and assigned to various client/server flows.
Proceedings ArticleDOI

Visualizing network data for intrusion detection

TL;DR: This paper addresses network traffic visualization techniques that aid an administrator in recognizing attacks in real time by improving upon current techniques that lack effectiveness due to an overemphasis on flow, nodes, or assumed familiarity with the attack tool.
Patent

Network service zone locking

TL;DR: In this paper, a zone locking system detects unauthorized network usage internal to a firewall by classifying internal hosts inside a firewall into zones, and a zone override service can be designated for each associated internal zone, and thus, authorizing selected network services.