Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Information Security

Jeremy Straub

Cybersecurity

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

Blackboard-Based Electronic Warfare System, Jeremy Straub Oct 2015

Blackboard-Based Electronic Warfare System, Jeremy Straub

Jeremy Straub

With internet-connected, SCADA and cyber-physical systems becoming the next battlefield for crime and warfare, technologies for defending and attacking these systems are growing in prevalence. For entities with significant asset collections that are prospectively vulnerable to this type of an attack, autonomous response, retaliation and attack capabilities are necessary to respond to a growing threat from numerous sectors. This paper presents a command and control technique for cyberwarfare based on the Blackboard Architecture. It discusses the utility of this approach and proposes a distributed command system that can run across multiple nodes of various types.


Implementing And Testing A Novel Chaotic Cryptosystem, Samuel Jackson, Scott Kerlin, Jeremy Straub Oct 2015

Implementing And Testing A Novel Chaotic Cryptosystem, Samuel Jackson, Scott Kerlin, Jeremy Straub

Jeremy Straub

Cryptography in the domain of small satellites is a relatively new area of research. Compared to typical desktop computers, small satellites have limited bandwidth, processing power, and battery power. Many of the current encryption schemes were developed for desktop computers and servers, and as such may be unsuitable for small satellites. In addition, most cryptographic research in the domain of small satellites focuses on hardware solutions, which can be problematic given the limited space requirements of small satellites.

This paper investigates potential software solutions that could be used to encrypt and decrypt data on small satellites and other devices with …


Improving Satellite Security Through Incremental Anomaly Detection On Large, Static Datasets, Connor Hamlet, Matthew Russell, Jeremy Straub, Scott Kerlin Aug 2015

Improving Satellite Security Through Incremental Anomaly Detection On Large, Static Datasets, Connor Hamlet, Matthew Russell, Jeremy Straub, Scott Kerlin

Jeremy Straub

Anomaly detection is a widely used technique to detect system intrusions. Anomaly detection in Intrusion Detection and Prevent Systems (IDPS) works by establishing a baseline of normal behavior and classifying points that are at a farther distance away as outliers. The result is an “anomaly score”, or how much a point is an outlier. Recent work has been performed which has examined use of anomaly detection in data streams [1]. We propose a new incremental anomaly detection algorithm which is up to 57,000x faster than the non-incremental version while slightly sacrificing the accuracy of results. We conclude that our method …


Scada System Security: Accounting For Operator Error And Malicious Intent, Ryan Kilbride, Jeremy Straub, Eunjin Kim Apr 2015

Scada System Security: Accounting For Operator Error And Malicious Intent, Ryan Kilbride, Jeremy Straub, Eunjin Kim

Jeremy Straub

Supervisory control and data acquisition (SCADA) systems are becoming more and more com-monplace in many industries today. Industries are making better use of software and large scale control systems to run efficiently, without the need for large amounts of oversight. Security is a particularly large issue with such systems, however. A human must still be involved to ensure smooth operation in the event of catastrophic system error, or unusual circumstanc-es. Human involvement presents problems: operators could make mistakes, configure the system to operate sub-optimally or take malicious actions. This imple-mentation of SCADA security aims to combat these problems.