Skip to main content

    Shyhtsun Wu

    ... Submitted: April 1997 by Y. Frank Jou Shyhtsun Felix Wu Fengmin Gong W. Rance CleavelandChandru Sargor MCNC Dept. of Computer Science Information Technologies Division North Carolina State University Research Triangle Park, NC 27709... more
    ... Submitted: April 1997 by Y. Frank Jou Shyhtsun Felix Wu Fengmin Gong W. Rance CleavelandChandru Sargor MCNC Dept. of Computer Science Information Technologies Division North Carolina State University Research Triangle Park, NC 27709 Raleigh, NC 27695-7914 ...
    Many tasks require multiple sensing capabilities; in Wireless Sensor Networks (WSN), it is expensive to deploy a homogeneous network wherein every sensor has the same functionality. Instead, it is economical to deploy a heterogeneous... more
    Many tasks require multiple sensing capabilities; in Wireless Sensor Networks (WSN), it is expensive to deploy a homogeneous network wherein every sensor has the same functionality. Instead, it is economical to deploy a heterogeneous network wherein sensors differ in their capabilities; in such a network, efficient data querying is essential. We propose a multi- keyword routing protocol, iBubble, for Heterogeneous
    Security and intrusion detection for routing protocols are two closely related topics in the protection of network infrastructure. The former focuses on secure network control protocols, while the latter is in the area of network security... more
    Security and intrusion detection for routing protocols are two closely related topics in the protection of network infrastructure. The former focuses on secure network control protocols, while the latter is in the area of network security management. In this paper, we study the integration of ...
    Abstract We describe a non-adhoc approach to building an SNMP protocol object for the Protocol Independent Management information Base (PIMIB). In the normal building process of an SNMP subagent, a certain amount of knowledge about the... more
    Abstract We describe a non-adhoc approach to building an SNMP protocol object for the Protocol Independent Management information Base (PIMIB). In the normal building process of an SNMP subagent, a certain amount of knowledge about the implementation of ...
    ... Wen-Fu Kao, S. Felix Wu Department of Computer Science, University of California, Davis {wkao,sfwu}@ucdavis.edu Abstract Supporting security features in hardware is relatively recent. ... However, a security feature may need to keep a... more
    ... Wen-Fu Kao, S. Felix Wu Department of Computer Science, University of California, Davis {wkao,sfwu}@ucdavis.edu Abstract Supporting security features in hardware is relatively recent. ... However, a security feature may need to keep a longer history for security completeness. ...
    The Management Information Base (MIB) plays a key role in a network management system (figure 1) simply because: first, network management applications need structured information about the managed network; second, the network itself... more
    The Management Information Base (MIB) plays a key role in a network management system (figure 1) simply because: first, network management applications need structured information about the managed network; second, the network itself usually does not ...
    Page 1. Bounds on the Performance of P2P Networks Using Tit-for-Tat Strategies Dimitri DeFigueiredo Balaji Venkatachalam S. Felix Wu Department of Computer Science – University of California, Davis {defigueiredo,bala,sfwu}@ucdavis.edu... more
    Page 1. Bounds on the Performance of P2P Networks Using Tit-for-Tat Strategies Dimitri DeFigueiredo Balaji Venkatachalam S. Felix Wu Department of Computer Science – University of California, Davis {defigueiredo,bala,sfwu}@ucdavis.edu Abstract ...
    There has been a vast amount of research and development effort aimed at providing solutions and products that address the security needs in the information age. Each solution tends to address only a particular facet of the security... more
    There has been a vast amount of research and development effort aimed at providing solutions and products that address the security needs in the information age. Each solution tends to address only a particular facet of the security problem and only accessible to limited protocols or applications. Moreover, ad hoc deployment of some solutions (e.g., firewalls and IPsec) can hinder our ability to collaborate across networks. A very important question is how any application can discover policy restrictions brought about by these solutions/mechanisms, and make efficient use of them to satisfy the application's security goals. The Celestial project addresses this question by developing a security management architecture that can (1) automatically discover effective security policies and mechanisms along any network path, (2) dynamically configure security mechanisms across protocol layers and across the network, (3) adaptively re-configure these mechanisms to maintain certain levels of security services when the network is under stress. This paper describes the Celestial system design and implementation, and reports the current status of the project
    The Management Information Base (MIB) plays a key role in a network management system (figure 1) simply because: first, network management applications need structured information about the managed network; second, the network itself... more
    The Management Information Base (MIB) plays a key role in a network management system (figure 1) simply because: first, network management applications need structured information about the managed network; second, the network itself usually does not ...
    The JiNao project at MCNC/NCSU focuses on detect-ing intrusions, especially insider attacks, against OSPF (Open Shortest Path First) routing protocol. This paper presents the implementation and experiments of the Ji-Nao's... more
    The JiNao project at MCNC/NCSU focuses on detect-ing intrusions, especially insider attacks, against OSPF (Open Shortest Path First) routing protocol. This paper presents the implementation and experiments of the Ji-Nao's statistical intrusion detection module. Our imple- ...
    As wireless motes are battery powered, many listen- sleep Medium Access Control (MAC) protocols have been pro- posed to reduce energy consumption. Security issues related to the design of these protocols have, however, largely been... more
    As wireless motes are battery powered, many listen- sleep Medium Access Control (MAC) protocols have been pro- posed to reduce energy consumption. Security issues related to the design of these protocols have, however, largely been ignored. In this paper, we present a novel attack (the synchronization attack) on listen-sleep MAC protocols. This attack can cause 100% message loss and approximately
    Page 1. Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System Daniela Alvim Seabra de Oliveira and S. Felix Wu Department of Computer Science University of California at Davis... more
    Page 1. Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System Daniela Alvim Seabra de Oliveira and S. Felix Wu Department of Computer Science University of California at Davis {oliveira,wu}@cs.ucdavis.edu ...
    ... Herve-Debar...(ed.).-Berlin; Heidelberg: New York; Barcelona; Hong Kong; London; Milan; Paris; Singapore: Tokyo: Springer, 2000 (Lecture notes in ... J. Atallah A Pattern Matching Based Filter for Audit Reduction and Fast Detection of... more
    ... Herve-Debar...(ed.).-Berlin; Heidelberg: New York; Barcelona; Hong Kong; London; Milan; Paris; Singapore: Tokyo: Springer, 2000 (Lecture notes in ... J. Atallah A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions 17 Josue Kuri, Gonzalo ...
    Many tasks require multiple sensing capabilities; in Wireless Sensor Networks (WSN), it is expensive to deploy a homogeneous network wherein every sensor has the same functionality. Instead, it is economical to deploy a heterogeneous... more
    Many tasks require multiple sensing capabilities; in Wireless Sensor Networks (WSN), it is expensive to deploy a homogeneous network wherein every sensor has the same functionality. Instead, it is economical to deploy a heterogeneous network wherein sensors differ in their capabilities; in such a network, efficient data querying is essential. We propose a multi- keyword routing protocol, iBubble, for Heterogeneous
    A coordination language, MELDC, for open systems programming is presented. MELDC is a C- based, concurrent, distributed object-oriented language built on a reflective architecture. Unlike other language research, the focus of MELDC is not... more
    A coordination language, MELDC, for open systems programming is presented. MELDC is a C- based, concurrent, distributed object-oriented language built on a reflective architecture. Unlike other language research, the focus of MELDC is not only to study what specific language features should be designed for solving certain open system problems but also to provide programmers a high-level and efficient way
    The JiNao IDS project focuses on detecting intrusions, especially insider attacks, against the OSPF (Open Shortest Path First) routing protocol. This paper presents the design, implementation and experiments of the protocol analysis and... more
    The JiNao IDS project focuses on detecting intrusions, especially insider attacks, against the OSPF (Open Shortest Path First) routing protocol. This paper presents the design, implementation and experiments of the protocol analysis and statistic anomaly detection modules in JiNao. Three OSPF insider attacks (i.e., maxseq, maxage, and seq++ attacks) have been developed for evaluating JiNao's detecting capability. JiNao's protocol analysis
    Research Interests:

    And 104 more