To become a USENIX Member, please see our Membership Information.
14th Systems Administration Conference
December 3-8, 2000
New Orleans, Louisiana, USA
Wednesday, December 6, 2000
REFEREED PAPERS
Deep Thoughts
Session Chair: Rémy Evard, Argonne National Laboratory
Theoretical System Administration
Mark Burgess, Oslo University College
An Expectant Chat About Script Maturity
Alva L. Couch, Tufts University
An Improved Approach for Generating Configuration Files from a Database
Jon Finke, Rensselaer Polytechnic Institute
You, a Rock, and a Hard Place
Session Chair: Christine Hogan, Imperial College
FOKSTRAUT and Samba--Dealing with Authentication and Performance Issues on a
Large-scale Samba Service
Robert Beck and Steve Holstead, University of Alberta
Designing a Data Center Instrumentation System
Robert Drzyzgula, Federal Reserve Board
Improving Availability in VERITAS Environments
Karl Larson, Tellme Networks, and Todd Stansell, GNAC, Inc.
Users and Passwords and Scripts, Oh My!
Session Chair: Trey Harris, Mail.com
User-Centric Account Management with Heterogeneous Password Changing
Douglas Hughes, Auburn University
Pelendur: Steward of the Sysadmin
Matt Curtin, Interhack Corp., and Sandy Farrar and Tami King, The Ohio State University
Network Information Management and Distribution in a Heterogeneous and
Decentralized Enterprise Environment
Alexander Kent and James Clifford, Los Alamos National Laboratory
NETWORK TRACK
Analyze This!
Session Chair: William LeFebvre, CNN Internet Technologies
Wide Area Network Packet Capture and Analysis
Jon T. Meek, American Home Products Corp
Sequencing of Configuration Operations for IP Networks
P. Krishnan, ISPsoft, Inc., Tejas Naik, Bell Laboratories, Ganesan Ramu, CoSine Comm., Inc., and Roshan Sequeira, ISPsoft, Inc.
ND: A Comprehensive Network Administration and Analysis Tool
Ellen L. Mitchell, Eric Nelson, and David Hess, Texas A&M University
Go With the Netflow
Session Chair: David Williamson, Certainty Solutions
Combining Cisco NetFlow Exports with Relational Database Technology for Usage Statistics, Intrusion Detection, and Network Forensics
Bill Nickless, John-Paul Navarro, and Linda Winkler, Argonne National
Laboratory
The OSU Flow-tools Package and CISCO NetFlow Logs
Steve Romig, Mark Fullmer, and Ron Luman, The Ohio State University
FlowScan: A Network Traffic Flow Reporting and Visualization Tool
Dave Plonka, University of Wisconsin, Madison
Thursday, December 7, 2000
REFEREED PAPERS
The Toolshed
Session Chair: Phil Scarr, Certainty Solutions
xps--Dynamic Process Tree Watching Under X
Rocky Bernstein, Breakaway Solutions
Extending UNIX System Logging with SHARP
Matthew Bing and Carl Erickson, Grand Valley State University
Peep (The Network Auralizer): Monitoring Your Network with Sound
Michael Gilfix and Alva L. Couch, Tufts University
1984
Session Chair: Jeff Allen, WebTV Networks, Inc.
Thresh--A Data-Directed SNMP Threshold Poller
John Sellens, Certainty Solutions
eEMU: A Practical Tool and Language for System Monitoring and Event
Management
Jarra Voleynik, eEMUconcept Pty Ltd
Aberrant Behavior Detection in Time Series for Network Monitoring
Jake D. Brutlag, WebTV
The Sorcerer's Apprentice
Session Chair: Josh Simon, Collective Technologies
PIKT: Problem Informant/Killer Tool
Robert Osterlund, University of Chicago
Relieving the Burden of System Administration Through Support Automation
Allan Miller and Alex Donnini, HandsFree Networks
FTP Mirror Tracker: A Few Steps Towards URN
Alexei Novikov, Institute of Theoretical and Experimental Physics, Moscow, and Martin Hamilton, Loughborough University, UK
Friday, December 8, 2000
REFEREED PAPERS
Fully Automatic
Session Chair: John Orthoefer, Genuity Inc.
Deployme: Tellme's Package Management and Deployment System
Kyle Oppenheim and Patrick McCormick, Tellme Networks
Automating Request-based Software Distribution
Christopher Hemmerich, Indiana University
Use of Cfengine for Automated, Multi-Platform Software and Patch Distribution
David Ressman and John Valdés, University of Chicago
Building Blocks
Session Chair: Ruth Milner, NRAO
Unleashing the Power of JumpStart: A New Technique for Disaster Recovery, Cloning, or Snapshotting a Solaris System
Lee "Leonardo" Amatangelo, Collective Technologies
A Linux Appliance Construction Setv
Michael W. Shaffer, Agilent Labs RCS
Automating Dual Boot (Linux and NT) Installations
Rajeev Agrawala, Rob Fulmer, and Shaun Erickson, Lucent/Bell Labs Research
SECURITY TRACK
Someone's Knocking at the Door...
Session Chair: Cat Okita, Global Crossing Ltd.
Tracing Anonymous Packets to Their Approximate Source
Hal Burch, Carnegie Mellon University; and Bill Cheswick, Lumeta Corporation
Analyzing Distributed Denial of Service Tools: The Shaft Case
Sven Dietrich, NASA Goddard Space Flight Center;
Neil Long, Oxford University; and
David Dittrich, University of Washington
...Don't Let Them In
Session Chair: Simon Cooper, SGI
YASSP! A Tool for Improving Solaris Security
Jean Chouanard, Xerox - Palo Alto Research Center
SubDomain: Parsimonious Server Security
Crispin Cowan, Steve Beattie, Greg Kroah-Hartman, Calton
Pu, Perry Wagle and Virgil Gligor, WireX Communications, Inc.
NOOSE - Networked Object-Oriented Security Examiner
Bruce Barnett, General Electric Corporate Research &
Development