An Investigation into the Performance of General Sorting on Graphics Processing Units
- Pilkington, Nick, Irwin, Barry V W
- Authors: Pilkington, Nick , Irwin, Barry V W
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429881 , vital:72648 , https://doi.org/10.1007/978-1-4020-8741-7_65
- Description: Sorting is a fundamental operation in computing and there is a constant need to push the boundaries of performance with different sorting algo-rithms. With the advent of the programmable graphics pipeline, the par-allel nature of graphics processing units has been exposed allowing programmers to take advantage of it. By transforming the way that data is represented and operated on parallel sorting algorithms can be im-plemented on graphics processing units where previously only graphics processing could be performed. This paradigm of programming exhibits potentially large speedups for algorithms.
- Full Text:
- Date Issued: 2008
- Authors: Pilkington, Nick , Irwin, Barry V W
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429881 , vital:72648 , https://doi.org/10.1007/978-1-4020-8741-7_65
- Description: Sorting is a fundamental operation in computing and there is a constant need to push the boundaries of performance with different sorting algo-rithms. With the advent of the programmable graphics pipeline, the par-allel nature of graphics processing units has been exposed allowing programmers to take advantage of it. By transforming the way that data is represented and operated on parallel sorting algorithms can be im-plemented on graphics processing units where previously only graphics processing could be performed. This paradigm of programming exhibits potentially large speedups for algorithms.
- Full Text:
- Date Issued: 2008
A Discussion Of Wireless Security Technologies
- Janse van Rensburg, Johanna, Irwin, Barry V W
- Authors: Janse van Rensburg, Johanna , Irwin, Barry V W
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429852 , vital:72645 , https://www.researchgate.net/profile/Barry-Ir-win/publication/228864029_A_DISCUSSION_OF_WIRELESS_SECURITY_TECHNOLOGIES/links/53e9c5190cf28f342f41492b/A-DISCUSSION-OF-WIRELESS-SECURITY-TECHNOLOGIES.pdf
- Description: The 802.11 standard contains a number of problems, ranging from in-terference, co-existence issues, exposed terminal problems and regula-tions to security. Despite all of these it has become a widely deployed technology as an extension of companies’ networks to provide mobility. In this paper the focus will be on the security issues of 802.11. Several solutions for the deployment of 802.11 security exists today, ranging from WEP, WPA, VPN and 802.11 i, each providing a different level of security. These technologies contain pros and cons which need to be understood in order to implement an appropriate solution suited to a specific scenario.
- Full Text:
- Date Issued: 2006
- Authors: Janse van Rensburg, Johanna , Irwin, Barry V W
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429852 , vital:72645 , https://www.researchgate.net/profile/Barry-Ir-win/publication/228864029_A_DISCUSSION_OF_WIRELESS_SECURITY_TECHNOLOGIES/links/53e9c5190cf28f342f41492b/A-DISCUSSION-OF-WIRELESS-SECURITY-TECHNOLOGIES.pdf
- Description: The 802.11 standard contains a number of problems, ranging from in-terference, co-existence issues, exposed terminal problems and regula-tions to security. Despite all of these it has become a widely deployed technology as an extension of companies’ networks to provide mobility. In this paper the focus will be on the security issues of 802.11. Several solutions for the deployment of 802.11 security exists today, ranging from WEP, WPA, VPN and 802.11 i, each providing a different level of security. These technologies contain pros and cons which need to be understood in order to implement an appropriate solution suited to a specific scenario.
- Full Text:
- Date Issued: 2006
Inetvis, a visual tool for network telescope traffic analysis
- van Riel, Jean-Pierre, Irwin, Barry V W
- Authors: van Riel, Jean-Pierre , Irwin, Barry V W
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430176 , vital:72671 , https://doi.org/10.1145/1108590.1108604
- Description: This article illustrates the merits of visual analysis as it presents prelimi-nary findings using InetVis - an animated 3-D scatter plot visualization of network events. The concepts and features of InetVis are evaluated with reference to related work in the field. Tested against a network scanning tool, anticipated visual signs of port scanning and network mapping serve as a proof of concept. This research also unveils sub-stantial amounts of suspicious activity present in Internet traffic during August 2005, as captured by a class C network telescope. InetVis is found to have promising scalability whilst offering salient depictions of intrusive network activity.
- Full Text:
- Date Issued: 2006
- Authors: van Riel, Jean-Pierre , Irwin, Barry V W
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430176 , vital:72671 , https://doi.org/10.1145/1108590.1108604
- Description: This article illustrates the merits of visual analysis as it presents prelimi-nary findings using InetVis - an animated 3-D scatter plot visualization of network events. The concepts and features of InetVis are evaluated with reference to related work in the field. Tested against a network scanning tool, anticipated visual signs of port scanning and network mapping serve as a proof of concept. This research also unveils sub-stantial amounts of suspicious activity present in Internet traffic during August 2005, as captured by a class C network telescope. InetVis is found to have promising scalability whilst offering salient depictions of intrusive network activity.
- Full Text:
- Date Issued: 2006
Wireless Security Tools
- Janse van Rensburg, Johanna, Irwin, Barry V W
- Authors: Janse van Rensburg, Johanna , Irwin, Barry V W
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429867 , vital:72647 , https://digifors.cs.up.ac.za/issa/2006/Proceedings/Research/113_Paper.pdf
- Description: Detecting and investigating intrusive Internet activity is an ever-present challenge for network administrators and security researchers. Network monitoring can generate large, unmanageable amounts of log data, which further complicates distinguishing between illegitimate and legiti-mate traffic. Considering the above issue, this article has two aims. First, it describes an investigative methodology for network monitoring and traffic review; and second, it discusses results from applying this method. The method entails a combination of network telescope traffic capture and visualisation. Observing traffic from the perspective of a dedicated sensor network reduces the volume of data and alleviates the concern of confusing malicious traffic with legitimate traffic. Com-plimenting this, visual analysis facilitates the rapid review and correla-tion of events, thereby utilizing human intelligence in the identification of scanning patterns. To demonstrate the proposed method, several months of network telescope traffic is captured and analysed with a tai-lor made 3D scatter-plot visualisation. As the results show, the visuali-sation saliently conveys anomalous patterns, and further analysis re-veals that these patterns are indicative of covert network probing activi-ty. By incorporating visual analysis with traditional approaches, such as textual log review and the use of an intrusion detection system, this re-search contributes improved insight into network scanning incidents.
- Full Text:
- Date Issued: 2006
- Authors: Janse van Rensburg, Johanna , Irwin, Barry V W
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429867 , vital:72647 , https://digifors.cs.up.ac.za/issa/2006/Proceedings/Research/113_Paper.pdf
- Description: Detecting and investigating intrusive Internet activity is an ever-present challenge for network administrators and security researchers. Network monitoring can generate large, unmanageable amounts of log data, which further complicates distinguishing between illegitimate and legiti-mate traffic. Considering the above issue, this article has two aims. First, it describes an investigative methodology for network monitoring and traffic review; and second, it discusses results from applying this method. The method entails a combination of network telescope traffic capture and visualisation. Observing traffic from the perspective of a dedicated sensor network reduces the volume of data and alleviates the concern of confusing malicious traffic with legitimate traffic. Com-plimenting this, visual analysis facilitates the rapid review and correla-tion of events, thereby utilizing human intelligence in the identification of scanning patterns. To demonstrate the proposed method, several months of network telescope traffic is captured and analysed with a tai-lor made 3D scatter-plot visualisation. As the results show, the visuali-sation saliently conveys anomalous patterns, and further analysis re-veals that these patterns are indicative of covert network probing activi-ty. By incorporating visual analysis with traditional approaches, such as textual log review and the use of an intrusion detection system, this re-search contributes improved insight into network scanning incidents.
- Full Text:
- Date Issued: 2006
- «
- ‹
- 1
- ›
- »