Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Computer Engineering

Network Security Toolkit Including Heuristic Solutions For Trust System Placement And Network Obfuscation, Gabriel H. Greve Dec 2010

Network Security Toolkit Including Heuristic Solutions For Trust System Placement And Network Obfuscation, Gabriel H. Greve

Theses and Dissertations

For Part I, a supervisory control and data acquisition (SCADA) network consists of a group stations and substations in a portion of the power grid. The use of Internet technology in SCADA communications as well as other factors has caused vulnerabilities. One idea to help mitigate this risk is to strategically place trust nodes to compartmentalize and secure the SCADA systems without disturbing its finely honed processes. The trust nodes combine firewall and intrusion detection technology to provide more secure communication. An optimal solution to this problem has already been developed using a mixed-integer linear programming model. Because the problem …


Knowledge-Based Decision Support In Department Of Defense Acquisitions, Clifton L. Hicks Sep 2010

Knowledge-Based Decision Support In Department Of Defense Acquisitions, Clifton L. Hicks

Theses and Dissertations

Despite numerous reform efforts over the past 30 years, acquisition programs in the Department of Defense (DoD) continue to experience cost overruns and schedule delays. One contributing factor is the decision-making process used by defense officials. The General Accounting Office (GAO) has stated that ‘poor program outcomes are the lack of widespread adoption of a knowledge-based acquisition process within DoD despite polices that support such a process. A knowledge-based business case at the outset of each program would alleviate overpromising on cost, schedule, and performance and would empower program managers.’ Effective decision-making for acquisition programs is very important. It not …


Mission Assurance: A Review Of Continuity Of Operations Guidance For Application To Cyber Incident Mission Impact Assessment (Cimia), Brian L. Hale Jun 2010

Mission Assurance: A Review Of Continuity Of Operations Guidance For Application To Cyber Incident Mission Impact Assessment (Cimia), Brian L. Hale

Theses and Dissertations

Military organizations have embedded information technology (IT) into their core mission processes as a means to increase operational efficiency, improve decision-making quality, and shorten the sensor-to-shooter cycle. This IT-to-mission dependence can place the organizational mission at risk when an information incident (e.g., the loss or manipulation of a critical information resource) occurs. Non-military organizations typically address this type of IT risk through an introspective, enterprise-wide focused risk management program that continuously identifies, prioritizes, and documents risks so an economical set of control measures (e.g., people, processes, technology) can be selected to mitigate the risks to an acceptable level. The explicit …


A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator, Justin M. Myers Jun 2010

A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator, Justin M. Myers

Theses and Dissertations

Log event correlation is an effective means of detecting system faults and security breaches encountered in information technology environments. Centralized, database-driven log event correlation is common, but suffers from flaws such as high network bandwidth utilization, significant requirements for system resources, and difficulty in detecting certain suspicious behaviors. This research presents a distributed event correlation system which performs security event detection, and compares it with a centralized alternative. The comparison measures the value in distributed event correlation by considering network bandwidth utilization, detection capability and database query efficiency, as well as through the implementation of remote configuration scripts and correlation …


Developing A Hybrid Virtualization Platform Design For Cyber Warfare And Simulation, Kyle E. Stewart Jun 2010

Developing A Hybrid Virtualization Platform Design For Cyber Warfare And Simulation, Kyle E. Stewart

Theses and Dissertations

Virtualization is a technique used to model and simulate the cyber domain, as well as train and educate. Different types of virtualization techniques exist that each support a unique set of benefits and requirements. This research proposes a novel design that incorporates host and network virtualization concepts for a cyber warfare training platform. At the host level, hybrid virtualization combines full and operating system virtualization techniques in order to leverage the benefits and minimize the drawbacks of each individual technique. Network virtualization allows virtual machines to connect in flexible topologies, but it also incurs additional processing overhead. Quantitative analysis falls …


Performance Evaluation Of A Field Programmable Gate Array-Based System For Detecting And Tracking Peer-To-Peer Protocols On A Gigabit Ethernet Network, Brennon D. Thomas Jun 2010

Performance Evaluation Of A Field Programmable Gate Array-Based System For Detecting And Tracking Peer-To-Peer Protocols On A Gigabit Ethernet Network, Brennon D. Thomas

Theses and Dissertations

Recent years have seen a massive increase in illegal, suspicious, and malicious traffic traversing government and military computer networks. Some examples include illegal file distribution and disclosure of sensitive information using the BitTorrent file sharing protocol, criminals and terrorists using Voice over Internet Protocol (VoIP) technologies to communicate, and foreign entities exfiltrating sensitive data from government, military, and Department of Defense contractor networks. As a result of these growing threats, the TRacking and Analysis for Peer-to-Peer (TRAPP) system was developed in 2008 to detect BitTorrent and VoIP traffic of interest. The TRAPP system, designed on a Xilinx Virtex-II Pro Field …


Flexible Computing Architecture For Real Time Skin Detection, Matthew P. Hornung Mar 2010

Flexible Computing Architecture For Real Time Skin Detection, Matthew P. Hornung

Theses and Dissertations

In both the Air Force and Search and Rescue Communities, there is a current need to detect and characterize persons. Existing methods use red-green-blue (RGB) imagery, but produce high false alarm rates. New technology in multi-spectral skin detection is better than the existing RGB methods, but lacks a control and processing architecture to make them efficient for real time problems. We hypothesize that taking a minimalistic approach to the software design, we can perform image preprocessing, feature computation, and skin detection in real time. A number of applications require accurate detection and characterization of persons, human measurement and signature intelligence …


Real Time Fault Detection And Diagnostics Using Fpga-Based Architecture, Nathan P. Naber Mar 2010

Real Time Fault Detection And Diagnostics Using Fpga-Based Architecture, Nathan P. Naber

Theses and Dissertations

Errors within circuits caused by radiation continue to be an important concern to developers. A new methodology of real time fault detection and diagnostics utilizing FPGA based architectures while under radiation were investigated in this research. The contributions of this research are focused on three areas; a full test platform to evaluate a circuit while under irradiation, an algorithm to detect and diagnose fault locations within a circuit, and finally to characterize Triple Design Triple Modular Redundancy (TDTMR), a new form of TMR. Five different test setups, injected fault test, gamma radiation test, thermal radiation test, optical laser test, and …


Using Decision Analysis To Select Facility Maintenance Management Information Systems, Marchello T. Graddy Mar 2010

Using Decision Analysis To Select Facility Maintenance Management Information Systems, Marchello T. Graddy

Theses and Dissertations

Maintenance organizations, charged with preserving the built environment, are receiving a shrinking portion of an organization’s operational budget to do its job. It has been demonstrated through various studies that efficiencies can be gained by implementing a maintenance management information system (MMIS). However, with so many choices available, maintenance organizations often select the wrong system. This research effort used value-focused thinking decision analysis to create a model based on values from the Air Force Civil Engineer career field. Data for values and weights were collected from official documents and interviews. The resulting model is highly flexible, allowing the ultimate decision-maker …