| REFEREED
PAPERS Room 6A
 
Network SecuritySession Chair: Doug Hughes, Auburn University
 
Snort - Lightweight Intrusion Detection for Networks
Martin Roesch, Stanford Telecommunications, Inc.
 
Internet Routing and DNS Voodoo in the Enterprise
D. Brian Larkins, Lucent Technologies
 
Moat: A Virtual Private Network Appliance and Services Platform
John S. Denker and  Steven M. Bellovin, AT&T Laboratories; Hugh Daniel,
FreeS/WAN Project; Nancy L. Mintz, Tom Killian, and Mark A. Plotnick, AT&T Laboratories
 
 | INVITED
TALKS Room 6B
 
NT Without Domain ControllersChris Stradtman, SYSNET Inc.
 
Four people set up and support 50+ NT 4.0 client sites using an NT domain served
by SAMBA on a Linux box. Result: Low cost, low on-site support time, reasonable
remote management.
 
Providing Reliable NT Desktop Services 
by Avoiding NT Server
Thomas A. Limoncelli, Lucent Technologies/Bell Labs
 
How does Bell Labs integrate NT and UNIX? We use open protocols to build a rich
and reliable user environment. We'll give you the technical underpinnings--and
how to sell the idea to management.
 | PRACTICUM Room 6C
 
University Issues Panel
 
William Annis, University of WisconsinDavid Brumley, Stanford University
 Robyn Landers, University of Waterloo
 Kathy Penn, University of Maryland
 Moderator: Jon Finke, Rensselaer Polytechnic Institute
 Presentation slides
 
In this highly interactive session, a panel of university sysadmins and the
audience will discuss problems common to the realm of academia.
 | 
| REFEREED
PAPERS Room 6A
 
Win a WiP!Session Chair: Peg Schafer, Harvard University
 
Short, pithy, and fun, Work in Progress reports introduce interesting new or
on-going work. Fast paced and spontanious, the WiPs feature new ideas
or novel solutions to old problems.  The number of presenters is limited,
so reserve your WiPs slot by sending a note to lisawips@usenix.org.
Work in Progress reports are generally five-minute presentations;
really interesting work can get more air time.
 | INVITED
TALKS Room 6B
 
Managing Your Network(s): Corporate Mergers & Acquisitions, or, You Got
Your Chocolate in My Peanut ButterEliot Lear, Cisco Systems
 
Is your company growing by purchasing other companies or by being purchased?
What do you need to do to your network to prepare for a merger? What do you need
to do to complete a merger? What tools will help you? We'll discuss routing
systems, addressing, firewalls, and network management tools and processes. And
of course there will be war stories!
 | PRACTICUM Room 6C
 
Results!
 
Summaries of the Topic Workshops (held earlier in the week), the Terminal Room
InstallFest, Day in the Life of a SysAdmin, and the salary survey.
 | 
| REFEREED
PAPERS Room 6A
 
InstallationsSession Chair: Evi Nemeth, University of Colorado and Cooperative Ass'n for
Internet Data Analysis
 
Automated Installation of Linux Systems Using YaST
Dirk Hohndel and Fabian Herschel, SuSE Rhein/Main AG
 
Enterprise Rollouts with Jumpstart
Jason Heiss, Collective Technologies
 
Automated Client-side Integration of Distributed Application Servers
Conrad E. Kimball, Vincent D. Skahan, Jr., and David J. Kasik, The  Boeing Company; Roger L. Droz,
Analysts International
 
 | | INVITED
TALKS Room 6B
 | PRACTICUM |  | State of the Art in Internet Measurement and Data Analysis: Topology,
Workload, Performance and Routing Statistics
 kc claffy, cooperative association for internet data analysis
 
This talk discusses the collection, analysis, and visualization of four forms of
Internet traffic data. Topology data describe network link infrastructure
at a variety of protocol layers. Workload measurements involve the
collection of traffic information from a point within a network. Performance
measurements involve the introduction of traffic into the network in order
to monitor delay between specific end-points. Routing data includes data
from Border Gateway Protocol (BGP) routing tables, which reflect the transit
relationships between individual Autonomous Systems (ASes) at a given point in
time.
 
The talk describes the role of each measurement area in understanding Internet
behavior and evolution; offers state-of-the-art analysis examples; outlines
current research priorities; and describes obstacles to making progress in each
area. | 
 
 |