BBN Technologies since 1995
Senior Scientist
Horizon Research 1993 - 1994
Member of Technical Staff
Thinking Machines Corporation 1989 - 1993
Member of Technical Staff
BBN 1977 - 1989
Member of technical staff
Education:
Massachusetts Institute of Technology 1974 - 1981
SB, Philosophy, Mathematics
Skills:
Computer Science Distributed Systems Python High Performance Computing Operating Systems Network Security IP Networking Network Programming Unix Networking SQL PostgreSQL MySQL R TCP/IP OpenSSL
Us Patents
Systems And Methods For High Speed Packet Classification
Verizon Corporate Services Group Inc. - New York NY BBN Technologies Corp. - Cambridge MA
International Classification:
H04L 12/56
US Classification:
370389
Abstract:
Systems and methods are disclosed for classifying packets with a rule. In one exemplary embodiment, the method includes receiving a packet; determining a key value for the received packet; identifying a rule corresponding to the determined key value by searching a set of rules, the set of rules being decorrelated such that there is no overlap in any key values corresponding to the decorrelated set of rules.
Kernel-Based Intrusion Detection Using Bloom Filters
Verizon Corporate Services Group Inc. - Basking Ridge NJ Raytheon BBN Technologies Corp. - Basking Ridge NJ
International Classification:
G06F 9/44 G06F 11/00 G06F 7/04
US Classification:
717127, 726 23, 726 25, 726 27
Abstract:
Kernel-based intrusion detection using Bloom filters is disclosed. In one of many possible embodiments for detecting an intrusion attack, a Bloom filter is provided and used to generate a Bloom filter data object. The Bloom filter data object contains data representative of expected system-call behavior associated with a computer program. The Bloom filter data object is embedded in an operating system (“OS”) kernel upon an invocation of the computer program. Actual system-call behavior is compared with the data in the Bloom filter data object.
Means Of Mitigating Denial Of Service Attacks On Ip Fragmentation In High Performance Ipsec Gateways
Embodiments of the invention reduce the probability of success of a DOS attack on a node receiving packets by decreasing the probability of random collisions of packets sent by a malicious user with those sent by honest users. The probability of random collisions may be reduced in one class of embodiments of the invention by supplementing the identification field of the IP header of each transmitted packet with at least one bit from another field of the header. The probability of random collisions may be reduced in another class of embodiments of the invention by ensuring that packets sent from a transmitting IPsec node to a receiving IPsec node are not fragmented.
System, Device, And Method For Unifying Differently-Routed Networks Using Virtual Topology Representations
David Patrick Mankins - Cambridge MA, US Gregory D. Troxel - Stow MA, US Karen Z. Haigh - Greenfield MN, US
Assignee:
Raytheon BBN Technologies Corp. - Cambridge MA
International Classification:
H04L 12/28
US Classification:
370254, 370401, 709242, 709249
Abstract:
Systems, devices, and methods for routing data through a first and a second ad-hoc network are described. Routing information structured according to a first routing protocol associated with a plurality of nodes in the first network is received at a border node that is part of at least the first and second ad-hoc networks. Routing information structured according to a second routing protocol associated with a plurality of nodes in the second ad-hoc network is also received. The received routing information is translated from the first routing protocol to the second routing protocol, or vice versa, and disseminated to nodes in the first or second ad-hoc networks. Data packets from nodes in the first ad-hoc network are forwarded to nodes in the second ad-hoc network, or vice versa, based in part on the translated routing information.
Systems And Methods For Decoy Routing And Covert Channel Bonding
Josh Forrest Karlin - Cambridge MA, US Gregory Stephen Lauer - Sudbury MA, US Craig Partridge - East Lansing MI, US David Patrick Mankins - Cambridge MA, US William Timothy Strayer - West Newton MA, US
Systems, methods, and devices for decoy routing and covert channel bonding are described. The decoy routing system includes a client computing device, a decoy router, and a decoy proxy such that packets addressed to a decoy destination are re-routed by the decoy router to a covert destination via the decoy proxy. The decoy routing method may be applied to a covert channel bonding process, in which a plurality of packet data streams are sent to one or more decoy destinations, re-routed appropriately via one or more decoy routers and/or decoy proxies, and assembled together into a single packet data stream at either a decoy proxy, or a final covert destination.
System And Method For Controlling The Right To Use An Item
Systems and methods are provided for controlling the right to use an item. A user seeking the use of the item may communicate to a server a code identifying a security object and any other information requested by the server. The server may use the code to retrieve a key associated with the security object. The server may execute a cryptographic algorithm on at least the key and a time-dependent input to generate a one-time password, which the server may report to the user. The one-time password may be used to successfully gain access to the security object item only once within a predetermined period of time. The security object, which is disconnected from the server, may receive from the user the one-time password and execute a cryptographic algorithm on a locally-retrieved key and a time-dependent input to generate another one-time password. If the one-time passwords match, the user may be granted access to the item.
Schemes For Determining Whether All Of The Fragments Of A Datagram Are Received
Schemes for determining whether all of the fragments of a datagram are received are described herein. The schemes described herein can allocate fifteen bits of memory to one or more counters to facilitate a determination of whether all of the fragments of a datagram are received.
Bar Code Input For Camera-Equipped Wireless Devices
A system facilitates the purchase of an item or service using a wireless device (). The system may capture an image of a bar code () associated with a device () from which the item or service is being purchased and transmit the image to facilitate payment for the item or service. The system may alternatively process the image to extract information from the image and transmit the extracted information to facilitate payment for the item or service.
Youtube
David Mankin Sightlines exhibition
David Mankin's 2019 Sightlines' exhibition at Cornwall Contemporary. S...
Duration:
1m 23s
Passage - Capturing the Spirit of Tintagel Ca...
For the cover of our new members' and visitors' handbook, we wanted so...
Duration:
14m 19s
David Mankin artist talk at Cornwall Contempo...
A short excerpt of the artist talk by David Mankin discussing his insp...
Duration:
6m 57s
Remembering Former Mayor David M. Dinkins
Today we honor a man who broke barriers and left a lasting mark on New...
Duration:
5m
An odd dog, very odd!
I got this crazy acting dog vid from my son, Danny Worthy, from a dogg...
David Mankins <c:out value="1969" />graduate of Santa Maria High School in Santa maria, CA is on Classmates.com. See pictures, plan your class reunion and get caught up with David ...
David Mankins 1998 graduate of Los Lunas High School in Los lunas, NM is on Classmates.com. See pictures, plan your class reunion and get caught up with David and other high school ...
David Mankins (1965-1969), Janae Abney (1989-1993), Cindy Quaid (1976-1980), Brian Dezember (1985-1989), Michael Buymer (1965-1969), Cecilia Jimenez (1972-1975)
Five of the Americans killed by FARC were members of a missionary group based in Sanford, Florida, called New Tribes Mission: David Mankins, Rich Tenenoff, Mark Rich, Stephen Welsh and Timothy Van Dyke. The sixth, Frank Pescatore Jr., was a geologist for an Alabama company working on a project in Co