Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Physical Sciences and Mathematics

Dual Channel-Based Network Traffic Authentication, David Irakiza Oct 2014

Dual Channel-Based Network Traffic Authentication, David Irakiza

Doctoral Dissertations

In a local network or the Internet in general, data that is transmitted between two computers (also known as network traffic or simply, traffic) in that network is usually classified as being of a malicious or of a benign nature by a traffic authentication system employing databases of previously observed malicious or benign traffic signatures, i.e., blacklists or whitelists, respectively. These lists typically consist of either the destinations (i.e., IP addresses or domain names) to which traffic is being sent or the statistical properties of the traffic, e.g., packet size, rate of connection establishment, etc. The drawback with the list-based …


Topology Dependence Of Ppm-Based Internet Protocol Traceback Schemes, Ankunda R. Kiremire Oct 2014

Topology Dependence Of Ppm-Based Internet Protocol Traceback Schemes, Ankunda R. Kiremire

Doctoral Dissertations

Multiple schemes that utilize probabilistic packet marking (PPM) have been proposed to deal with Distributed Denial of Service (DDoS) attacks by reconstructing their attack graphs and identifying the attack sources.

In the first part of this dissertation, we present our contribution to the family of PPM-based schemes for Internet Protocol (IP) traceback. Our proposed approach, Prediction-Based Scheme (PBS), consists of marking and traceback algorithms that reduce scheme convergence times by dealing with the problems of data loss and incomplete attack graphs exhibited by previous PPM-based schemes.

Compared to previous PPM-based schemes, the PBS marking algorithm ensures that traceback is possible …


Modeling Profile-Attribute Disclosure In Online Social Networks From A Game Theoretic Perspective, Jundong Chen Jul 2014

Modeling Profile-Attribute Disclosure In Online Social Networks From A Game Theoretic Perspective, Jundong Chen

Doctoral Dissertations

Privacy settings are a crucial part of any online social network as users are confronted with determining which and how many profile attributes to disclose. Revealing more attributes increases users chances of finding friends and yet leaves users more vulnerable to dangers such as identity theft. In this dissertation, we consider the problem of finding the optimal strategy for the disclosure of user attributes in social networks from a game-theoretic perspective.

We model the privacy settings' dynamics of social networks with three game-theoretic approaches. In a two-user game, each user selects an ideal number of attributes to disclose to each …


A Knowledge Discovery Approach For The Detection Of Power Grid State Variable Attacks, Nathan Wallace Jul 2014

A Knowledge Discovery Approach For The Detection Of Power Grid State Variable Attacks, Nathan Wallace

Doctoral Dissertations

As the level of sophistication in power system technologies increases, the amount of system state parameters being recorded also increases. This data not only provides an opportunity for monitoring and diagnostics of a power system, but it also creates an environment wherein security can be maintained. Being able to extract relevant information from this pool of data is one of the key challenges still yet to be obtained in the smart grid. The potential exists for the creation of innovative power grid cybersecurity applications, which harness the information gained from advanced analytics. Such analytics can be based on the extraction …


Numerical Solutions For Problems With Complex Physics In Complex Geometry, Yifan Wang Apr 2014

Numerical Solutions For Problems With Complex Physics In Complex Geometry, Yifan Wang

Doctoral Dissertations

In this dissertation, two high order accurate numerical methods, Spectral Element Method (SEM) and Discontinuous Galerkin method (DG), are discussed and investigated. The advantages of both methods and their applicable areas are studied. Particular problems in complex geometry with complex physics are investigated and their high order accurate numerical solutions obtained by using either SEM or DG are presented. Furthermore, the Smoothed Particle Hydrodynamics (SPH) (a mesh-free weighted interpolation method) is implemented on graphics processing unit (GPU). Some numerical simulations of the complex flow with a free surface are presented and discussed to show the advantages of SPH method in …


Performance Modeling And Optimization Techniques For Heterogeneous Computing, Supada Laosooksathit Jan 2014

Performance Modeling And Optimization Techniques For Heterogeneous Computing, Supada Laosooksathit

Doctoral Dissertations

Since Graphics Processing Units (CPUs) have increasingly gained popularity amoung non-graphic and computational applications, known as General-Purpose computation on GPU (GPGPU), CPUs have been deployed in many clusters, including the world's fastest supercomputer. However, to make the most efficiency from a GPU system, one should consider both performance and reliability of the system.

This dissertation makes four major contributions. First, the two-level checkpoint/restart protocol that aims to reduce the checkpoint and recovery costs with a latency hiding strategy in a system between a CPU (Central Processing Unit) and a GPU is proposed. The experimental results and analysis reveals some benefits, …


Vulnerability Analysis Of Cyber-Behavioral Biometric Authentication, Abdul Serwadda Jan 2014

Vulnerability Analysis Of Cyber-Behavioral Biometric Authentication, Abdul Serwadda

Doctoral Dissertations

Research on cyber-behavioral biometric authentication has traditionally assumed naïve (or zero-effort) impostors who make no attempt to generate sophisticated forgeries of biometric samples. Given the plethora of adversarial technologies on the Internet, it is questionable as to whether the zero-effort threat model provides a realistic estimate of how these authentication systems would perform in the wake of adversity. To better evaluate the efficiency of these authentication systems, there is need for research on algorithmic attacks which simulate the state-of-the-art threats.

To tackle this problem, we took the case of keystroke and touch-based authentication and developed a new family of algorithmic …