Check out the new USENIX Web site.

Home About USENIX Events Membership Publications Students
LISA 2000 Technical Program

To become a USENIX Member, please see our Membership Information.

14th Systems Administration Conference
December 3-8, 2000
New Orleans, Louisiana, USA

Wednesday, December 6, 2000


Deep Thoughts
Session Chair: Rémy Evard, Argonne National Laboratory

Theoretical System Administration
Mark Burgess, Oslo University College

An Expectant Chat About Script Maturity
Alva L. Couch, Tufts University

An Improved Approach for Generating Configuration Files from a Database
Jon Finke, Rensselaer Polytechnic Institute

You, a Rock, and a Hard Place
Session Chair: Christine Hogan, Imperial College

FOKSTRAUT and Samba--Dealing with Authentication and Performance Issues on a Large-scale Samba Service
Robert Beck and Steve Holstead, University of Alberta

Designing a Data Center Instrumentation System
Robert Drzyzgula, Federal Reserve Board

Improving Availability in VERITAS Environments
Karl Larson, Tellme Networks, and Todd Stansell, GNAC, Inc.

Users and Passwords and Scripts, Oh My!
Session Chair: Trey Harris,

User-Centric Account Management with Heterogeneous Password Changing
Douglas Hughes, Auburn University

Pelendur: Steward of the Sysadmin
Matt Curtin, Interhack Corp., and Sandy Farrar and Tami King, The Ohio State University

Network Information Management and Distribution in a Heterogeneous and Decentralized Enterprise Environment
Alexander Kent and James Clifford, Los Alamos National Laboratory


Analyze This!
Session Chair: William LeFebvre, CNN Internet Technologies

Wide Area Network Packet Capture and Analysis
Jon T. Meek, American Home Products Corp

Sequencing of Configuration Operations for IP Networks
P. Krishnan, ISPsoft, Inc., Tejas Naik, Bell Laboratories, Ganesan Ramu, CoSine Comm., Inc., and Roshan Sequeira, ISPsoft, Inc.

ND: A Comprehensive Network Administration and Analysis Tool
Ellen L. Mitchell, Eric Nelson, and David Hess, Texas A&M University

Go With the Netflow
Session Chair: David Williamson, Certainty Solutions

Combining Cisco NetFlow Exports with Relational Database Technology for Usage Statistics, Intrusion Detection, and Network Forensics
Bill Nickless, John-Paul Navarro, and Linda Winkler, Argonne National Laboratory

The OSU Flow-tools Package and CISCO NetFlow Logs
Steve Romig, Mark Fullmer, and Ron Luman, The Ohio State University

FlowScan: A Network Traffic Flow Reporting and Visualization Tool
Dave Plonka, University of Wisconsin, Madison

Thursday, December 7, 2000


The Toolshed
Session Chair: Phil Scarr, Certainty Solutions

xps--Dynamic Process Tree Watching Under X
Rocky Bernstein, Breakaway Solutions

Extending UNIX System Logging with SHARP
Matthew Bing and Carl Erickson, Grand Valley State University

Peep (The Network Auralizer): Monitoring Your Network with Sound
Michael Gilfix and Alva L. Couch, Tufts University

Session Chair: Jeff Allen, WebTV Networks, Inc.

Thresh--A Data-Directed SNMP Threshold Poller
John Sellens, Certainty Solutions

eEMU: A Practical Tool and Language for System Monitoring and Event Management
Jarra Voleynik, eEMUconcept Pty Ltd

Aberrant Behavior Detection in Time Series for Network Monitoring
Jake D. Brutlag, WebTV

The Sorcerer's Apprentice
Session Chair: Josh Simon, Collective Technologies

PIKT: Problem Informant/Killer Tool
Robert Osterlund, University of Chicago

Relieving the Burden of System Administration Through Support Automation
Allan Miller and Alex Donnini, HandsFree Networks

FTP Mirror Tracker: A Few Steps Towards URN
Alexei Novikov, Institute of Theoretical and Experimental Physics, Moscow, and Martin Hamilton, Loughborough University, UK

Friday, December 8, 2000


Fully Automatic
Session Chair: John Orthoefer, Genuity Inc.

Deployme: Tellme's Package Management and Deployment System
Kyle Oppenheim and Patrick McCormick, Tellme Networks

Automating Request-based Software Distribution
Christopher Hemmerich, Indiana University

Use of Cfengine for Automated, Multi-Platform Software and Patch Distribution
David Ressman and John Valdés, University of Chicago

Building Blocks
Session Chair: Ruth Milner, NRAO

Unleashing the Power of JumpStart: A New Technique for Disaster Recovery, Cloning, or Snapshotting a Solaris System
Lee "Leonardo" Amatangelo, Collective Technologies

A Linux Appliance Construction Setv
Michael W. Shaffer, Agilent Labs RCS

Automating Dual Boot (Linux and NT) Installations
Rajeev Agrawala, Rob Fulmer, and Shaun Erickson, Lucent/Bell Labs Research


Someone's Knocking at the Door...
Session Chair: Cat Okita, Global Crossing Ltd.

Tracing Anonymous Packets to Their Approximate Source
Hal Burch, Carnegie Mellon University; and Bill Cheswick, Lumeta Corporation

Analyzing Distributed Denial of Service Tools: The Shaft Case
Sven Dietrich, NASA Goddard Space Flight Center; Neil Long, Oxford University; and David Dittrich, University of Washington

...Don't Let Them In
Session Chair: Simon Cooper, SGI

YASSP! A Tool for Improving Solaris Security
Jean Chouanard, Xerox - Palo Alto Research Center

SubDomain: Parsimonious Server Security
Crispin Cowan, Steve Beattie, Greg Kroah-Hartman, Calton Pu, Perry Wagle and Virgil Gligor, WireX Communications, Inc.

NOOSE - Networked Object-Oriented Security Examiner
Bruce Barnett, General Electric Corporate Research & Development

?Need help? Use our Contacts page.

Last changed: 16 Jan. 2002 ml
Technical Program
LISA 2000 Home