Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Entire DC Network

Dds-Cerberus: Improving Security In Dds Middleware Using Kerberos Tickets, Andrew T. Park Mar 2022

Dds-Cerberus: Improving Security In Dds Middleware Using Kerberos Tickets, Andrew T. Park

Theses and Dissertations

The military deploys many IoT in battlefield operations to provide information on terrain and enemy combatants. It also deploys automated robots or UAVs where securing and trusting collected data is essential. Choosing the middleware that handles this message transfer is crucial for real-time operations. Networks with multiple entities, including IoT devices, UAVs, and small computers, require robust middleware facilitating message sending in real-time. Ideally, the middleware would provide QoS to handle lost packets and retransmissions in lossy environments, especially between low-power machines. DDS is a middleware that implements real-time and QoS capabilities by sending messages, not based on endpoints but …


Evaluation Of Traditional Security Solutions In The Scada Environment, Robert D. Larkin Mar 2012

Evaluation Of Traditional Security Solutions In The Scada Environment, Robert D. Larkin

Theses and Dissertations

Supervisory Control and Data Acquisition (SCADA) systems control and monitor the electric power grid, water treatment facilities, oil and gas pipelines, railways, and other Critical Infrastructure (CI). In recent years, organizations that own and operate these systems have increasingly interconnected them with their enterprise network to take advantage of cost savings and operational benefits. This trend, however, has introduced myriad vulnerabilities associated with the networking environment. As a result, the once isolated systems are now susceptible to a wide range of threats that previously did not exist. To help address the associated risks, security professionals seek to incorporate mitigation solutions …


A Distributed Network Logging Topology, Nicholas E. Fritts Mar 2010

A Distributed Network Logging Topology, Nicholas E. Fritts

Theses and Dissertations

Network logging is used to monitor computer systems for potential problems and threats by network administrators. Research has found that the more logging enabled, the more potential threats can be detected in the logs (Levoy, 2006). However, generally it is considered too costly to dedicate the manpower required to analyze the amount of logging data that it is possible to generate. Current research is working on different correlation and parsing techniques to help filter the data, but these methods function by having all of the data dumped in to a central repository. Central repositories are limited in the amount of …


Operationalizing Offensive Social Engineering For The Air Force, Bryan E. Skarda Mar 2008

Operationalizing Offensive Social Engineering For The Air Force, Bryan E. Skarda

Theses and Dissertations

Social engineering is the art and science of persuading individuals to bypass in place security mechanisms causing the unintended release of information. It is a low tech solution to a high tech problem and is as much an art as a science. As is true of many such solutions, social engineering is both ill-defined yet extremely effective. Its low cost, high payoff nature makes it an extremely attractive alternative to adversaries that do not have access to all the resources of a nation state. However, with full backing, the weapon can become that much more effective. Social engineering is something …


Digital Fingerprinting Of Field Programmable Gate Arrays, James W. Crouch Mar 2008

Digital Fingerprinting Of Field Programmable Gate Arrays, James W. Crouch

Theses and Dissertations

Commercial off-the-shelf (COTS) component usage is becoming more prevalent in military applications due to current Department of Defense (DoD) policies. The easy accessibility of COTS will give reverse engineers a higher probability of successfully tampering, coping, or reverse engineering circuits that contain critical capabilities. To prevent this and verify the trustworthiness of hardware, circuit identification tags or serials numbers can be used. However, these values can be easily obtained and forged. To protect critical DoD technologies from possible exploitation, there is an urgent need for a reliable method to confirm a circuit’s identity using a set of unique unforgettable metrics. …


Development Of A Methodology For Customizing Insider Threat Auditing On A Microsoft Windows Xp® Operating System, Terry E. Levoy Jun 2006

Development Of A Methodology For Customizing Insider Threat Auditing On A Microsoft Windows Xp® Operating System, Terry E. Levoy

Theses and Dissertations

Most organizations are aware that threats from trusted insiders pose a great risk to their organization and are very difficult to protect against. Auditing is recognized as an effective technique to detect malicious insider activities. However, current auditing methods are typically applied with a one-size-fits-all approach and may not be an appropriate mitigation strategy, especially towards insider threats. This research develops a 4-step methodology for designing a customized auditing template for a Microsoft Windows XP operating system. Two tailoring methods are presented which evaluate both by category and by configuration. Also developed are various metrics and weighting factors as a …


Mitigating Tcp Degradation Over Intermittent Link Failures Using Intermediate Buffers, M. Brent Reynolds Jun 2006

Mitigating Tcp Degradation Over Intermittent Link Failures Using Intermediate Buffers, M. Brent Reynolds

Theses and Dissertations

This thesis addresses the improvement of data transmission performance in a challenged network. It is well known that the popular Transmission Control Protocol degrades in environments where one or more of the links along the route is intermittently available. To avoid this degradation, this thesis proposes placing at least one node along the path of transmission to buffer and retransmit as needed to overcome the intermittent link. In the four-node, three-link testbed under particular conditions, file transmission time was reduced 20 fold in the case of an intermittent second link when the second node strategically buffers for retransmission opportunity.


Medium Access Control And Networking Protocols For The Intra-Body Network, Eric Thomas Stucki Mar 2006

Medium Access Control And Networking Protocols For The Intra-Body Network, Eric Thomas Stucki

Theses and Dissertations

Biomedical applications offer an exciting growth opportunity for wireless sensor networks. However, radio frequency communication is problematic in hospital environments that are susceptible to interference in the industrial, scientific, and medical (ISM) bands. Also, RF is inherently insecure as eavesdroppers can easily pick up signals. The Intra-Body Network (IBNet) proposes a novel communication model for biomedical sensor networks. It seeks the convenience of wireless communication while avoiding interference and privacy concerns associated with RF. IBNet's solution is to utilize a subject's own body tissue as a transmission medium. Assuming that transmissions are contained within the body, IBNet solves otherwise complex …


An Analysis Of The Performance And Security Of J2sdk 1.4 Jsse Implementation Of Ssl/Tls, Danny R. Bias Mar 2004

An Analysis Of The Performance And Security Of J2sdk 1.4 Jsse Implementation Of Ssl/Tls, Danny R. Bias

Theses and Dissertations

The Java SSL/TLS package distributed with the J2SE 1.4.2 runtime is a Java implementation of the SSLv3 and TLSv1 protocols. Java-based web services and other systems deployed by the DoD will depend on this implementation to provide confidentiality, integrity, and authentication. Security and performance assessment of this implementation is critical given the proliferation of web services within DoD channels. This research assessed the performance of the J2SE 1.4.2 SSL and TLS implementations, paying particular attention to identifying performance limitations given a very secure configuration. The performance metrics of this research were CPU utilization, network bandwidth, memory, and maximum number of …


Deception Detection In A Computer-Mediated Environment: Gender, Trust, And Training Issues, Monica A. Dziubinski Mar 2003

Deception Detection In A Computer-Mediated Environment: Gender, Trust, And Training Issues, Monica A. Dziubinski

Theses and Dissertations

The Department of Defense is increasingly relying on computer-mediated communications to conduct business. This reliance introduces an amplified vulnerability to strategic information manipulation, or deception. This research draws on communication and deception literature to develop a conceptual model proposing relationships between deception detection abilities in a computer-mediated environment, gender, trust, and training. An experiment was conducted with 119 communications personnel to test the proposed hypotheses. No relationship between gender or trust and deception detection accuracy was found. Partial support was found showing that training improves deception detection accuracy. The most significant finding was that individual’s deception detection abilities deteriorate in …


An Analysis Of Multiple Layered Networks, Kevin T. Kennedy Mar 2003

An Analysis Of Multiple Layered Networks, Kevin T. Kennedy

Theses and Dissertations

Current infrastructure network models of single functionality do not typically account for the interdependent nature of infrastructure networks. Infrastructure networks are generally modeled individually, as an isolated network or with minimal recognition of interactions. This research develops a methodology to model the individual infrastructure network types while explicitly modeling their interconnected effects. The result is a formulation built with two sets of variables (the original set to model infrastructure characteristics and an additional set representing cuts of interdependent elements). This formulation is decomposed by variable type using Benders Partitioning and solved to optimality using a Benders Partitioning algorithm. Current infrastructure …


Categorizing Network Attacks Using Pattern Classification Algorithms, George E. Noel Iii Mar 2002

Categorizing Network Attacks Using Pattern Classification Algorithms, George E. Noel Iii

Theses and Dissertations

The United States Air Force relies heavily on computer networks for many day-to-day activities. Many of these networks are affected by various types of attacks that can be launched from anywhere on the globe. The rising prominence of organizations such as the AFCERT and the MAJCOM NOSCs is evidence of an increasing realization among the Air Force leadership that protecting our computer networks is vitally important. A critical requirement for protecting our networks is the ability to detect attacks and intrusion attempts. This research is an effort to refine a portion of an AFIT-developed intrusion detection system known as the …


Multicast Algorithms For Mobile Satellite Communication Networks, Ryan W. Thomas Mar 2001

Multicast Algorithms For Mobile Satellite Communication Networks, Ryan W. Thomas

Theses and Dissertations

With the rise of mobile computing and an increasing need for ubiquitous high speed data connections, Internet-in-the-sky solutions are becoming increasingly viable. To reduce the network overhead of one-to-many transmissions, the multicast protocol has been devised. The implementation of multicast in these Low Earth Orbit (LEO) constellations is a critical component to achieving an omnipresent network environment. This research examines the system performance associated with two terrestrial-based multicast mobility solutions, Distance Vector Multicast Routing Protocol (DVMRP) with mobile IP and On Demand Multicast Routing Protocol (ODMRP). These protocols are implemented and simulated in a six plane, 66 satellite LEO constellation. …


An Analysis Of The Effectiveness Of Online Peer Feedback At The United States Air Force Academy, Annette M. Driscoll Dec 1997

An Analysis Of The Effectiveness Of Online Peer Feedback At The United States Air Force Academy, Annette M. Driscoll

Theses and Dissertations

This thesis explores the effectiveness of the Air Force Academy's Department of English local area network peer feedback system. Four main questions were examined. These questions explored a) whether students reported improvement in their writing, b) whether students reported that feedback is worthwhile, c) whether students reported that LAN sessions increase enjoyment of writing, and d) what types of feedback the students 1) received and 2) found most helpful. Three groups were studied. Forty-six students received feedback online, fifty students received feedback face to face, and thirty-three students did not receive feedback. Comparisons were made for the questions mentioned above …


A Comparative Analysis Of Networks Of Workstations And Massively Parallel Processors For Signal Processing, David C. Gindhart Dec 1997

A Comparative Analysis Of Networks Of Workstations And Massively Parallel Processors For Signal Processing, David C. Gindhart

Theses and Dissertations

The traditional approach to parallel processing has been to use Massively Parallel Processors (MPPs). An alternative design is commercial-off-the-shelf (COTS) workstations connected to high-speed networks. These networks of workstations (NOWs) typically have faster processors, heterogeneous environments, and most importantly, offer a lower per node cost. This thesis compares the performance of MPPs and NOWs for the two-dimensional fast Fourier transform (2-D FFT). Three original, high-performance, portable 2-D FFTs have been implemented: the vector-radix, row-column and pipeline. The performance of these algorithms was measured on the Intel Paragon, IBM SP2 and the AFIT NOW, which consists of 6 Sun Ultra workstations …


Ethical Issues In A Networked Environment, Kristen G. Sallberg Dec 1997

Ethical Issues In A Networked Environment, Kristen G. Sallberg

Theses and Dissertations

The research objective was to provide a preliminary understanding of how USAF computer users perceive the ethical considerations of computer networks and how the USAF is addressing ethical issues of networked environments. A survey was undertaken to explore questions of ethics in the use of information networks. The literature review explored issues of ethics in the private sector and USAF guidance regarding use of official government resources. The sample population consisted of military members stationed at Wright-Patterson Air Force Base Ohio. The responses regarding certain attitudes about behaviors and actions in a networked environment were consistent overall. A significant difference …


A Specific Network Link And Path Likelihood Prediction Tool, Gary K. Moy Dec 1996

A Specific Network Link And Path Likelihood Prediction Tool, Gary K. Moy

Theses and Dissertations

Communications have always been a crucial part of any military operation. As the pace of warfare and the technological complexity of weaponry have increased, so has the need for rapid information to assess battlefield conditions. Message passing across a network of communication nodes allowed commanders to communicate with their forces. It is clear that an accurate prediction of communication usage through a network will provide commanders with useful intelligence of friendly and unfriendly activities. Providing a specific network link and path likelihood prediction tool gives strategic military commanders additional intelligence information and enables them to manage their limited resources more …


Assessing The Vulnerability Of Multi-Commodity Networks With Failing Components, Alan R. Robinson Mar 1994

Assessing The Vulnerability Of Multi-Commodity Networks With Failing Components, Alan R. Robinson

Theses and Dissertations

This research proposes an analytical approach for assessing flow disturbance, or compromise, based on limited sampling of arc flow information in multi-commodity, or multiple origin-destination O-D, networks with failing arcs. There were three objectives established for this research. The first objective was to bound the expected flow, given the arcs fail with certain probabilities, which was accomplished by reviewing current approaches for single-commodity networks and extending the results to the multi-commodity case. The second objective was to determine the best placement of flow monitors to obtain the most accurate estimates of O-D pair volumes. This was accomplished using a multi-criteria …