Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- #antcenter (1)
- Amplitude scintillation (1)
- Cyber threat (1)
- Cyber threat intelligence (1)
- File provenance (1)
-
- Forensic timelines (1)
- High altitude nuclear explosion (1)
- Honeypot (1)
- Industrial control (1)
- Industrial control systems (1)
- Intrusion detection systems (1)
- Malware attacks (1)
- Network infrastructure (1)
- Network traffic generation (1)
- Non-GPS (1)
- Passive location (1)
- Positioning (1)
- Signal absorption (1)
- Signal loss (1)
- Signals of opportunity (1)
- Threat intelligence platforms (1)
- Timing (1)
- Windows Forensics (1)
Articles 1 - 5 of 5
Full-Text Articles in Engineering
Framework For Industrial Control System Honeypot Network Traffic Generation, Htein A. Lin
Framework For Industrial Control System Honeypot Network Traffic Generation, Htein A. Lin
Theses and Dissertations
Defending critical infrastructure assets is an important but extremely difficult and expensive task. Historically, decoys have been used very effectively to distract attackers and in some cases convince an attacker to reveal their attack strategy. Several researchers have proposed the use of honeypots to protect programmable logic controllers, specifically those used to support critical infrastructure. However, most of these honeypot designs are static systems that wait for a would-be attacker. To be effective, honeypot decoys need to be as realistic as possible. This paper introduces a proof-of-concept honeypot network traffic generator that mimics genuine control systems. Experiments are conducted using …
Satellite Communications In The V And W Band: Natural And Artificial Scintillation Effects, David A. Smith
Satellite Communications In The V And W Band: Natural And Artificial Scintillation Effects, David A. Smith
Theses and Dissertations
In a natural atmospheric environment the troposphere will be the primary source of loss with the ionosphere loss being negligible. If the ionosphere was disturbed from a high altitude nuclear explosion (HANE) more than three times the amount of electrons would be present in the ionosphere and could represent a source of significant loss. In order to determine the amount of electrons distributed from a HANE, GSCENARIO, developed by Defense Threat Reduction Agency was used. The two sources of loss that were examined was signal absorption and amplitude scintillation. Signal loss was determined using GSCENARIO and amplitude scintillation loss was …
Autoprov: An Automated File Provenance Collection Tool, Ryan A. Good
Autoprov: An Automated File Provenance Collection Tool, Ryan A. Good
Theses and Dissertations
A file's provenance is a detailing of its origins and activities. There are tools available that are useful in maintaining the provenance of a file. Unfortunately for digital forensics, these tools require prior installation on the computer of interest while provenance generating events happen. The presented tool addresses this by reconstructing a file's provenance from several temporal artifacts. It identifies relevant temporal and user correlations between these artifacts, and presents them to the user. A variety of predefined use cases and real world data are tested against to demonstrate that this software allows examiners to draw useful conclusions about the …
Applying Cyber Threat Intelligence To Industrial Control Systems, Matthew P. Sibiga
Applying Cyber Threat Intelligence To Industrial Control Systems, Matthew P. Sibiga
Theses and Dissertations
A cybersecurity initiative known as cyber threat intelligence (CTI) has recently been developed and deployed. The overall goal of this new technology is to help protect network infrastructures. Threat intelligence platforms (TIPs) have also been created to help facilitate CTI effectiveness within organizations. There are many benefits that both can achieve within the information technology (IT) sector. The industrial control system (ICS) sector can also benefit from these technologies as most ICS networks are connected to IT networks. CTI and TIPs become resourceful when using indicators of compromise (IOCs) from known ICS malware attacks and an open source intrusion detection …
Sound Based Positioning, David L. Weathers
Sound Based Positioning, David L. Weathers
Theses and Dissertations
With a growing interest in non-GPS positioning, navigation, and timing (PNT), sound based positioning provides a precise way to locate both sound sources and microphones through audible signals of opportunity (SoOPs). Exploiting SoOPs allows for passive location estimation. But, attributing each signal to a specific source location when signals are simultaneously emitting proves problematic. Using an array of microphones, unique SoOPs are identified and located through steered response beamforming. Sound source signals are then isolated through time-frequency masking to provide clear reference stations by which to estimate the location of a separate microphone through time difference of arrival measurements. Results …