Birds on a wire and the Ising model
Statistical physics is very good at describing lots of physical systems, but one of the basic tenets underlying our technology is that statistical physics is also a good framework for describing...
View ArticleThe chimera of cyberdeterrence
One thing I’ve heard a lot of people talk about recently is the need to develop good theories of cyberdeterrence. It’s making the think tank rounds and what not. But the basic assumptions that...
View ArticleCommon ecology quantifies human insurgency
Researchers in Colombia, Miami, and the UK have published an article in this week’s Nature that claims to identify what amounts to universal power-law behavior (though they don’t call it that, and...
View ArticleChina and Google
Time for the (n+1)th dissection of Google’s recent announcement concerning cyberattacks and censorship. (You’ve got to love recursion!) As Galrahn points out, discounting Google’s market share relative...
View ArticleThe Clinton doctrine
After the fallout from Aurora, US Secretary of State Hillary Clinton gave a major speech last Thursday at the Newseum in DC. Highlights below: The spread of information networks is forming a new...
View ArticleMartingales from finite Markov processes, part 1
In an earlier series of posts the emerging inhomogeneous Poissonian nature of network traffic was detailed. One implication of this trend is that not only network flows but also individual packets will...
View ArticleEquilibrium Networks beta
Our visual network traffic monitoring software (for background information, see our website) has successfully passed our internal tests, so we are packaging a Linux-oriented beta distribution that is...
View ArticleRandom bits
“in [Richard Clarke's] Cyberwar, like in real war, truth is the first casualty” Cyberdeterrence through tattlling? This is ridiculous. Not bloody likely that will work against serious hackers. And not...
View ArticleEffective statistical physics of Anosov systems
We’ve just posted a paper titled “Effective statistical physics of Anosov systems” that details the physical relevance of the techniques we’ve used to characterize network traffic. The idea is that...
View ArticleMIRCON and network counteroffensives
I popped in for a couple of stretches at Mandiant’s MIRcon incident response conference today and yesterday and was struck by a panel discussion on Tuesday about defenders going on offense. The gist...
View Article
More Pages to Explore .....