Document Type
Closed Project
Publication Date
Summer 2011
Instructor
Tugrul Daim
Course Title
Technology Transfer
Course Number
ETM 533/633
Abstract
The Johns Hopkins University – Applied Physical Laboratory (JHU‐APL), located in Laurel, Maryland, is a research and technology division of The Johns Hopkins University. JHU‐APL conducts and maintains specialized research and test facilities, employs approximately 4,500 employees, and receives annual funds exceeding $988 million dollars.1 JHU‐APL strengths lie primarily in sensor technology, biomedical applications, electronics, space technology and communications. JHU‐APL has a rich portfolio with more than 700 active inventions. These inventions include software, tangible products and intangible products (copyrighted material and active/pending patents). JHU‐APL has a rich portfolio of applications ready and available for commercial transfer, yet only received $32.8 million in licensing income from 1999 through 2010.2 After reviewing JHU‐APL’s available technologies, our team has selected “NetTaster” as a recommended technology to transfer. The team finds this technology to have a strong market need, key core functions/assets, many notable comparative advantages and complimentary assets promoting commercial success. In the past decade technological advances have increased the usage of internet by integrating many different environments/eco‐systems (personal, business, government etc) into one platform. Technological advances and their internet integration have both enhanced life and created new and additional risks. Primary risks associated with the internet are “hackers”. The said primary risk, hacker, grew from script kiddies (who hack for fun) to extremely sophisticated hackers or organizations of hackers who infiltrate cyber‐systems for personal, commercial, and political agenda. Cyber attacks are ubiquitous and lead to loss of personal, professional as well as governmental secret information.3 Current day, organizations use Intrusion Detection Systems (IDS) or antimalware/ antivirus/anti‐spyware to protect against these cyber attacks. However, these current technological solutions fail to protect against new (zero day) attacks. There is a tremendous market need for advanced technology that can detect zero day attacks. Our team discovered, reviewed, and selected JHU‐APL’s “NetTaster” technology for transfer due to its capability to detect instantaneous, zero day attacks as they occur. This report will expand on topics discussed in the above Executive Summary. Topics to be discussed are: JHU‐APL background & description, JHU‐APL Office of Technology Transfer,5 targeted technology ‐ NetTaster, Technology Transfer Plan, and Recommendations & Conclusions.
Rights
In Copyright. URI: http://rightsstatements.org/vocab/InC/1.0/ This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).
Persistent Identifier
http://archives.pdx.edu/ds/psu/22239
Citation Details
Dwivedi, Akhilesh; Yucha, Aron E.; Jain, Chintan; and Gomez, Fredy, "Transferring Intrusion
Detection System (IDS) –
“Net Taster” Technology
from John Hopkins
University-Applied Physics
Laboratory" (2011). Engineering and Technology Management Student Projects. 655.
http://archives.pdx.edu/ds/psu/22239
Comments
This project is only available to students, faculty, and staff of Portland State University.