Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Entire DC Network

Early Warning And Prediction Of Internet Attacks And Exploits, Brian P. Zeitz Sep 2005

Early Warning And Prediction Of Internet Attacks And Exploits, Brian P. Zeitz

Theses and Dissertations

A safe, secure, and functional information network is vital in today’s Air Force net centric environment. Information is more critical today than it has ever been. As more operational functions are placed in cyber space and greater computing power becomes available to everyone, keeping these networks safe and secure is an almost unattainable task. Network security entails Intrusion Detection Security, but another form of security or “insecurity” is quickly gaining attention. Honeypots allow the black hat community to attack and penetrate non-production systems. By monitoring and studying these attacks, network defenders can develop better Information Assurance tactics, techniques and procedures …


Passwords: A Survey On Usage And Policy, Kurt W. Martinson Mar 2005

Passwords: A Survey On Usage And Policy, Kurt W. Martinson

Theses and Dissertations

Computer password use is on the rise. Passwords have become one of the primary authentication methods used today. It is because of their high use that organizations have started to place parameters on passwords. Are password restrictions a nuisance? What are some of the consequences that result as organizations place the burden of their computer security on passwords? This thesis analyzes the results of a survey instrument that was used to determine if individuals are using similar techniques or patterns when choosing or remembering their passwords. It also looks at how individuals feel about using passwords. In addition, the authors …


An Historical Analysis Of Factors Contributing To The Emergence Of The Intrusion Detection Discipline And Its Role In Information Assurance, James L.M. Hart Mar 2005

An Historical Analysis Of Factors Contributing To The Emergence Of The Intrusion Detection Discipline And Its Role In Information Assurance, James L.M. Hart

Theses and Dissertations

In 2003, Gartner, Inc., predicted the inevitable demise of the intrusion detection (ID) market, a major player in the computer security technology industry. In light of this prediction, IT executives need to know if intrusion detection technologies serve a strategic purpose within the framework of information assurance (IA). This research investigated the historical background and circumstances that led to the birth of the intrusion detection field and explored the evolution of the discipline through current research in order to identify appropriate roles for IDS technology within an information assurance framework. The research identified factors contributing to the birth of ID …


Medical Devices, Support Networks, And Their Vulnerabilities: A Case Study Of The Integration Of Medical Networks Into The Air Force Information Network, Paul G. Oleksiak Mar 2005

Medical Devices, Support Networks, And Their Vulnerabilities: A Case Study Of The Integration Of Medical Networks Into The Air Force Information Network, Paul G. Oleksiak

Theses and Dissertations

With the implementation of "one Air Force, one network" under way it is important to look at how the Air Force plans to incorporate the medical field and its unique systems, networks, and mission. The medical field presents distinctive problems not seen in other areas. Open network vulnerabilities in the medical information systems not only pose a problem for the individual, but to the military service also. Possible security holes provide both access to vital military & personal information (end strength numbers, current status of personnel, social security), and a door way into the "network". Intruders now can possibly access …


Simple Public Key Infrastructure Analysis Protocol Analysis And Design, Alexander G. Vidergar Mar 2005

Simple Public Key Infrastructure Analysis Protocol Analysis And Design, Alexander G. Vidergar

Theses and Dissertations

Secure electronic communication is based on secrecy, authentication and authorization. One means of assuring a communication has these properties is to use Public Key Cryptography (PKC). The framework consisting of standards, protocols and instructions that make PKC usable in communication applications is called a Public Key Infrastructure (PKI). This thesis aims at proving the applicability of the Simple Public Key Infrastructure (SPKI) as a means of PKC. The strand space approach of Guttman and Thayer is used to provide an appropriate model for analysis. A Diffie-Hellman strand space model is combined with mixed strand space proof methods for proving the …


Efficient Generation Of Social Network Data From Computer-Mediated Communication Logs, Jason Wei Sung Yee Mar 2005

Efficient Generation Of Social Network Data From Computer-Mediated Communication Logs, Jason Wei Sung Yee

Theses and Dissertations

The insider threat poses a significant risk to any network or information system. A general definition of the insider threat is an authorized user performing unauthorized actions, a broad definition with no specifications on severity or action. While limited research has been able to classify and detect insider threats, it is generally understood that insider attacks are planned, and that there is a time period in which the organization's leadership can intervene and prevent the attack. Previous studies have shown that the person's behavior will generally change, and it is possible that social network analysis could be used to observe …


An Evolutionary Algorithm To Generate Ellipsoid Detectors For Negative Selection, Joseph M. Shapiro Mar 2005

An Evolutionary Algorithm To Generate Ellipsoid Detectors For Negative Selection, Joseph M. Shapiro

Theses and Dissertations

Negative selection is a process from the biological immune system that can be applied to two-class (self and nonself) classification problems. Negative selection uses only one class (self) for training, which results in detectors for the other class (nonself). This paradigm is especially useful for problems in which only one class is available for training, such as network intrusion detection. Previous work has investigated hyper-rectangles and hyper-spheres as geometric detectors. This work proposes ellipsoids as geometric detectors. First, the author establishes a mathematical model for ellipsoids. He develops an algorithm to generate ellipsoids by training on only one class of …


A Study To Determine Damage Assessment Methods Or Models On Air Force Networks, Lisa S. Thiem Mar 2005

A Study To Determine Damage Assessment Methods Or Models On Air Force Networks, Lisa S. Thiem

Theses and Dissertations

Damage assessment for computer networks is a new area of interest for the Air Force. Previously, there has not been a concerted effort to codify damage assessment or develop a model that can be applied in assessing damage done by criminals, natural disasters, or other methods of damaging a computer network. The research undertaken attempts to identify if the Air Force MAJCOM Network Operations Support Centers (NOSC) use damage assessment models or methods. If the Air Force does use a model or method, an additional question of how the model was attained or decided upon is asked. All information comes …


Enabling Intrusion Detection In Ipsec Protected Ipv6 Networks Through Secret-Key Sharing, Patrick J. Sweeney Mar 2005

Enabling Intrusion Detection In Ipsec Protected Ipv6 Networks Through Secret-Key Sharing, Patrick J. Sweeney

Theses and Dissertations

As the Internet Protocol version 6 (IPv6) implementation becomes more widespread, the IP Security (IPSec) features embedded into the next-generation protocol will become more accessible than ever. Though the network-layer encryption provided by IPSec is a boon to data security, its use renders standard network intrusion detection systems (NIDS) useless. The problem of performing intrusion detection on encrypted traffic has been addressed by differing means with each technique requiring one or more static secret keys to be shared with the NIDS beforehand. The problem with this approach is static keying is much less secure than dynamic key generation through the …