Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (7)
- Computer Sciences (6)
- Digital Communications and Networking (6)
- Information Security (6)
- Electrical and Computer Engineering (4)
-
- Systems and Communications (3)
- Aerospace Engineering (2)
- Computer and Systems Architecture (2)
- Navigation, Guidance, Control and Dynamics (2)
- Controls and Control Theory (1)
- Data Storage Systems (1)
- Geography (1)
- Hardware Systems (1)
- Multi-Vehicle Systems and Air Traffic Control (1)
- Optics (1)
- Other Computer Engineering (1)
- Physics (1)
- Social and Behavioral Sciences (1)
- Spatial Science (1)
- Keyword
-
- #antcenter (2)
- Industrial control systems (2)
- Absolute Position (1)
- Air Traffic Controller (1)
- Air Traffic Data (1)
-
- Cryptography (1)
- Cyber defense training (1)
- Cyber incident response (1)
- Cyber security (1)
- Cyber threat (1)
- Cyber threat intelligence (1)
- Cyber training environments (1)
- DRMS (1)
- Digital Radar (1)
- Distributed geographic index (1)
- File provenance (1)
- Forensic timelines (1)
- Honeypot (1)
- IDS (1)
- Industrial control (1)
- Inter-vehicle (1)
- Intrusion Detection System (1)
- Intrusion detection systems (1)
- Location-based search (1)
- Malware attacks (1)
- Motion model (1)
- Network infrastructure (1)
- Network security (1)
- Network traffic generation (1)
- OpenFlow (1)
- Publication
- Publication Type
Articles 1 - 11 of 11
Full-Text Articles in Computer Engineering
Transferable Multiparty Computation, Michael R. Clark, Kenneth M. Hopkinson
Transferable Multiparty Computation, Michael R. Clark, Kenneth M. Hopkinson
AFIT Patents
A method and apparatus are provided for secure multiparty computation. A set of first parties is selected from a plurality of first parties for computation. Inputs for computation associated with each party in the set of first parties are divided into shares to be sent to other parties in the set of first parties. The computation on the shares is performed by the set of first parties using multiparty computation functions. In response to a trigger event, shares of the set of first parties are transferred to a set of second parties selected from a plurality of second parties. The …
A Location-Aware Middleware Framework For Collaborative Visual Information Discovery And Retrieval, Andrew J.M. Compton
A Location-Aware Middleware Framework For Collaborative Visual Information Discovery And Retrieval, Andrew J.M. Compton
Theses and Dissertations
This work addresses the problem of scalable location-aware distributed indexing to enable the leveraging of collaborative effort for the construction and maintenance of world-scale visual maps and models which could support numerous activities including navigation, visual localization, persistent surveillance, structure from motion, and hazard or disaster detection. Current distributed approaches to mapping and modeling fail to incorporate global geospatial addressing and are limited in their functionality to customize search. Our solution is a peer-to-peer middleware framework based on XOR distance routing which employs a Hilbert Space curve addressing scheme in a novel distributed geographic index. This allows for a universal …
Stereoscopic 3-D Presentation For Air Traffic Control Digital Radar Displays, Jason G. Russi, Brent T. Langhals, Michael E. Miller, Eric L. Heft
Stereoscopic 3-D Presentation For Air Traffic Control Digital Radar Displays, Jason G. Russi, Brent T. Langhals, Michael E. Miller, Eric L. Heft
AFIT Patents
An apparatus and method of presenting air traffic data to an air traffic controller are provided. Air traffic data including a two dimensional spatial location and altitude for a plurality of aircraft is received. A disparity value is determined based on the altitude for each aircraft of the plurality of aircraft. Left and right eye images are generated of the plurality of aircraft where at least one of the left and right eye images is based on the determined disparity value. The left and right eye images are simultaneously displayed to the air traffic controller on a display. The simultaneously …
Active Response Using Host-Based Intrusion Detection System And Software-Defined Networking, Jonathon S. Goodgion
Active Response Using Host-Based Intrusion Detection System And Software-Defined Networking, Jonathon S. Goodgion
Theses and Dissertations
This research proposes AHNSR: Active Host-based Network Security Response by utilizing Host-based Intrusion Detection Systems (HIDS) with Software-Defined Networking (SDN) to enhance system security by allowing dynamic active response and reconstruction from a global network topology perspective. Responses include traffic redirection, host quarantining, filtering, and more. A testable SDN-controlled network is constructed with multiple hosts, OpenFlow enabled switches, and a Floodlight controller, all linked to a custom, novel interface for the Open-Source SECurity (OSSEC) HIDS framework. OSSEC is implemented in a server-agent architecture, allowing scalability and OS independence. System effectiveness is evaluated against the following factors: alert density and a …
Framework For Industrial Control System Honeypot Network Traffic Generation, Htein A. Lin
Framework For Industrial Control System Honeypot Network Traffic Generation, Htein A. Lin
Theses and Dissertations
Defending critical infrastructure assets is an important but extremely difficult and expensive task. Historically, decoys have been used very effectively to distract attackers and in some cases convince an attacker to reveal their attack strategy. Several researchers have proposed the use of honeypots to protect programmable logic controllers, specifically those used to support critical infrastructure. However, most of these honeypot designs are static systems that wait for a would-be attacker. To be effective, honeypot decoys need to be as realistic as possible. This paper introduces a proof-of-concept honeypot network traffic generator that mimics genuine control systems. Experiments are conducted using …
Small Fixed-Wing Aerial Positioning Using Inter-Vehicle Ranging Combined With Visual Odometry, Benjamin M. Fain
Small Fixed-Wing Aerial Positioning Using Inter-Vehicle Ranging Combined With Visual Odometry, Benjamin M. Fain
Theses and Dissertations
There has been increasing interest in developing the ability for small unmanned aerial systems (SUAS) to be able to operate in environments where GPS is not available. This research considers the case of a larger aircraft loitering above a smaller GPS-denied SUAS. This larger aircraft is assumed to have greater resources which can overcome the GPS jamming and provide range information to the SUAS flying a mission below. This research demonstrates that using a ranging update combined with an aircraft motion model and visual odometry can greatly improve the accuracy of a SUASs estimated position in a GPS-denied environment.
Autoprov: An Automated File Provenance Collection Tool, Ryan A. Good
Autoprov: An Automated File Provenance Collection Tool, Ryan A. Good
Theses and Dissertations
A file's provenance is a detailing of its origins and activities. There are tools available that are useful in maintaining the provenance of a file. Unfortunately for digital forensics, these tools require prior installation on the computer of interest while provenance generating events happen. The presented tool addresses this by reconstructing a file's provenance from several temporal artifacts. It identifies relevant temporal and user correlations between these artifacts, and presents them to the user. A variety of predefined use cases and real world data are tested against to demonstrate that this software allows examiners to draw useful conclusions about the …
A Framework For Understanding, Prioritizing, And Applying Systems Security Engineering Processes, Activities, And Tasks, Stephen Khou
A Framework For Understanding, Prioritizing, And Applying Systems Security Engineering Processes, Activities, And Tasks, Stephen Khou
Theses and Dissertations
Current systems security practices lack an effective approach to prioritize and tailor systems security efforts to develop and field secure systems in challenging operational environments, which results in business and mission stakeholders becoming more susceptible to an array of disruptive events. This work informs Systems Engineers on recent developments in the field of system security engineering and provides a framework for more fully understanding the application of Systems Security Engineering (SSE) processes, activities, and tasks as described in the recently released National Institute of Standards and Technology (NIST) Special Publication 800-160. This SSE framework uniquely offers a repeatable and tailorable …
Development Of The Architecture Cost Effectiveness Framework And Application To Open Systems Architectures, Donald A. Barrett
Development Of The Architecture Cost Effectiveness Framework And Application To Open Systems Architectures, Donald A. Barrett
Theses and Dissertations
The Modular Open System Approach (MOSA) is an initiative to, among other things, reduce cost and schedule for acquisitions programs. While programs have experienced savings using MOSA, the majority of programs have not, in part due to a lack of a logical method for evaluating architecture alternatives. This research develops the Architecture Cost Effectiveness Framework (ACEF), which combines multi-attribute utility analysis with cost effectiveness analysis throughout the program lifecycle. Step 1 is the establishment of a business strategy that includes an Attribute Hierarchy of selected operational requirements. The business strategy also defines Lifecycle Utility Reference Profiles (LURPs) that document changing …
A Framework For Categorization Of Industrial Control System Cyber Training Environments, Evan G. Plumley
A Framework For Categorization Of Industrial Control System Cyber Training Environments, Evan G. Plumley
Theses and Dissertations
First responders and professionals in hazardous occupations undergo training and evaluations for the purpose of mitigating risk and damage. For example, helicopter pilots train with multiple categorized simulations that increase in complexity before flying a real aircraft. However in the industrial control cyber incident response domain, where incident response professionals help detect, respond and recover from cyber incidents, no official categorization of training environments exist. To address this gap, this thesis provides a categorization of industrial control training environments based on realism. Four levels of environments are proposed and mapped to Blooms Taxonomy. This categorization will help organizations determine which …
Applying Cyber Threat Intelligence To Industrial Control Systems, Matthew P. Sibiga
Applying Cyber Threat Intelligence To Industrial Control Systems, Matthew P. Sibiga
Theses and Dissertations
A cybersecurity initiative known as cyber threat intelligence (CTI) has recently been developed and deployed. The overall goal of this new technology is to help protect network infrastructures. Threat intelligence platforms (TIPs) have also been created to help facilitate CTI effectiveness within organizations. There are many benefits that both can achieve within the information technology (IT) sector. The industrial control system (ICS) sector can also benefit from these technologies as most ICS networks are connected to IT networks. CTI and TIPs become resourceful when using indicators of compromise (IOCs) from known ICS malware attacks and an open source intrusion detection …