Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Engineering

Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire Dec 2008

Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire

Theses and Dissertations

Intent protection is a model of software obfuscation which, among other criteria, prevents an adversary from understanding the program’s function for use with contextual information. Relating this framework for obfuscation to malware detection, if a malware detector can perfectly normalize a program P and any obfuscation (variant) of the program O(P), the program is not intent protected. The problem of intent protection on programs can also be modeled as intent protection on combinational logic circuits. If a malware detector can perfectly normalize a circuit C and any obfuscation (variant) O(C) of the circuit, the circuit is not intent protected. In …


A Secure And Efficient Communications Architecture For Global Information Grid Users Via Cooperating Space Assets, Victor P. Hubenko Jun 2008

A Secure And Efficient Communications Architecture For Global Information Grid Users Via Cooperating Space Assets, Victor P. Hubenko

Theses and Dissertations

With the Information Age in full and rapid development, users expect to have global, seamless, ubiquitous, secure, and efficient communications capable of providing access to real-time applications and collaboration. The United States Department of Defense’s (DoD) Network-Centric Enterprise Services initiative, along with the notion of pushing the “power to the edge,” aims to provide end-users with maximum situational awareness, a comprehensive view of the battlespace, all within a secure networking environment. Building from previous AFIT research efforts, this research developed a novel security framework architecture to address the lack of efficient and scalable secure multicasting in the low earth orbit …


An Analysis Of Botnet Vulnerabilities, Sean W. Hudson Jun 2008

An Analysis Of Botnet Vulnerabilities, Sean W. Hudson

Theses and Dissertations

Botnets are a significant threat to computer networks and data stored on networked computers. The ability to inhibit communication between servers controlling the botnet and individual hosts would be an effective countermeasure. The objective of this research was to find vulnerabilities in Unreal IRCd that could be used to shut down the server. Analysis revealed that Unreal IRCd is a very mature and stable IRC server and no significant vulnerabilities were found. While this research does not eliminate the possibility that a critical vulnerability is present in the Unreal IRCd software, none were identified during this effort.


Composable Distributed Access Control And Integrity Policies For Query-Based Wireless Sensor Networks, David W. Marsh Mar 2008

Composable Distributed Access Control And Integrity Policies For Query-Based Wireless Sensor Networks, David W. Marsh

Theses and Dissertations

An expected requirement of wireless sensor networks (WSN) is the support of a vast number of users while permitting limited access privileges. While WSN nodes have severe resource constraints, WSNs will need to restrict access to data, enforcing security policies to protect data within WSNs. To date, WSN security has largely been based on encryption and authentication schemes. WSN Authorization Specification Language (WASL) is specified and implemented using tools coded in JavaTM. WASL is a mechanism{independent policy language that can specify arbitrary, composable security policies. The construction, hybridization, and composition of well{known security models is demonstrated and shown to preserve …


Multi-Class Classification Fusion Using Boosting For Identifying Steganography Methods, Benjamin M. Rodriguez, Gilbert L. Peterson Mar 2008

Multi-Class Classification Fusion Using Boosting For Identifying Steganography Methods, Benjamin M. Rodriguez, Gilbert L. Peterson

Faculty Publications

No abstract provided.


Digital Signal Processing Leveraged For Intrusion Detection, Theodore J. Erickson Mar 2008

Digital Signal Processing Leveraged For Intrusion Detection, Theodore J. Erickson

Theses and Dissertations

This thesis describes the development and evaluation of a novel system called the Network Attack Characterization Tool (NACT). The NACT employs digital signal processing to detect network intrusions, by exploiting the Lomb-Scargle periodogram method to obtain a spectrum for sampled network traffic. The Lomb-Scargle method for generating a periodogram allows for the processing of unevenly sampled network data. This method for determining a periodogram has not yet been used for intrusion detection. The spectrum is examined to determine if features exist above a significance level chosen by the user. These features are considered an attack, triggering an alarm. Two traffic …


Signal Processing Design Of Low Probability Of Intercept Waveforms, Nathaniel C. Liefer Mar 2008

Signal Processing Design Of Low Probability Of Intercept Waveforms, Nathaniel C. Liefer

Theses and Dissertations

This thesis investigates a modification to Differential Phase Shift Keyed (DPSK) modulation to create a Low Probability of Interception/Exploitation (LPI/LPE) communications signal. A pseudorandom timing offset is applied to each symbol in the communications stream to intentionally create intersymbol interference (ISI) that hinders accurate symbol estimation and bit sequence recovery by a non-cooperative receiver. Two cooperative receiver strategies are proposed to mitigate the ISI due to symbol timing offset: a modified minimum Mean Square Error (MMSE) equalization algorithm and a multiplexed bank of equalizer filters determined by an adaptive Least Mean Square (LMS) algorithm. Both cooperative receivers require some knowledge …


Network Formation Using Ant Colony Optimization -- A Systematic Review, Steven C. Oimoen, Gilbert L. Peterson, Kenneth M. Hopkinson Jan 2008

Network Formation Using Ant Colony Optimization -- A Systematic Review, Steven C. Oimoen, Gilbert L. Peterson, Kenneth M. Hopkinson

Faculty Publications

A significant area of research in the field of hybrid communications is the Network Design Problem (NDP) [1]. The NDP is an NP complete problem [1] that focuses on identifying the optimal network topology for transmitting commodities between nodes, under constraints such as bandwidth, limited compatible directed channels, and link and commodity costs. The NDP focuses on designing a flexible network while trying to achieve optimal flow or routing. If a link (or arc) is used, then an associated fixed cost of the edge is incurred. In addition, there is a cost for using the arc depending on the flow. …