Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Physical Sciences and Mathematics

Ramping Down Chinese Commercial Cyber Espionage, Emilio Iasiello Dec 2015

Ramping Down Chinese Commercial Cyber Espionage, Emilio Iasiello

Emilio Iasiello

While detractors believe that commercial cyber espionage hasn’t really stopped, recent Chinese efforts show a government trying to get a handle on its large spying apparatus that could include hired and independent contractors acting autonomously in addition to its other resources. While complete cessation may never occur, significant timely reduction demonstrates Beijing’s willingness to work with the United States as a partner and not a pariah, and provides a foundation from which the two governments can move forward on other cyber security areas where incongruity persists.


Blackboard-Based Electronic Warfare System, Jeremy Straub Oct 2015

Blackboard-Based Electronic Warfare System, Jeremy Straub

Jeremy Straub

With internet-connected, SCADA and cyber-physical systems becoming the next battlefield for crime and warfare, technologies for defending and attacking these systems are growing in prevalence. For entities with significant asset collections that are prospectively vulnerable to this type of an attack, autonomous response, retaliation and attack capabilities are necessary to respond to a growing threat from numerous sectors. This paper presents a command and control technique for cyberwarfare based on the Blackboard Architecture. It discusses the utility of this approach and proposes a distributed command system that can run across multiple nodes of various types.


Improving Satellite Security Through Incremental Anomaly Detection On Large, Static Datasets, Connor Hamlet, Matthew Russell, Jeremy Straub, Scott Kerlin Aug 2015

Improving Satellite Security Through Incremental Anomaly Detection On Large, Static Datasets, Connor Hamlet, Matthew Russell, Jeremy Straub, Scott Kerlin

Jeremy Straub

Anomaly detection is a widely used technique to detect system intrusions. Anomaly detection in Intrusion Detection and Prevent Systems (IDPS) works by establishing a baseline of normal behavior and classifying points that are at a farther distance away as outliers. The result is an “anomaly score”, or how much a point is an outlier. Recent work has been performed which has examined use of anomaly detection in data streams [1]. We propose a new incremental anomaly detection algorithm which is up to 57,000x faster than the non-incremental version while slightly sacrificing the accuracy of results. We conclude that our method …


Scada System Security: Accounting For Operator Error And Malicious Intent, Ryan Kilbride, Jeremy Straub, Eunjin Kim Apr 2015

Scada System Security: Accounting For Operator Error And Malicious Intent, Ryan Kilbride, Jeremy Straub, Eunjin Kim

Jeremy Straub

Supervisory control and data acquisition (SCADA) systems are becoming more and more com-monplace in many industries today. Industries are making better use of software and large scale control systems to run efficiently, without the need for large amounts of oversight. Security is a particularly large issue with such systems, however. A human must still be involved to ensure smooth operation in the event of catastrophic system error, or unusual circumstanc-es. Human involvement presents problems: operators could make mistakes, configure the system to operate sub-optimally or take malicious actions. This imple-mentation of SCADA security aims to combat these problems.


Are Cyber Weapons Effective Military Tools?, Emilio Iasiello Apr 2015

Are Cyber Weapons Effective Military Tools?, Emilio Iasiello

Emilio Iasiello

Cyber-attacks are often viewed in academic and military writings as strategic asymmetric weapons, great equalizers with the potential of leveling the battlefield between powerful nations and those less capable. More substantive examples demonstrate that cyber-attacks have been more successful in non-military activities, as they may serve as a clandestine weapon of subterfuge better positioned to incapacitate systems without alerting the victims, veiling the orchestrator’s true identity via proxy groups and plausible deniability. Consequently, this paper provides a counter argument to the idea that cyber tools are instrumental military weapons in modern day warfare; cyber weapons are more effective options during …


Small Satellite Communications Security And Student Learning In The Development Of Ground Station Software, Scott Kerlin, Jeremy Straub, Jacob Huhn, Alexander Lewis Mar 2015

Small Satellite Communications Security And Student Learning In The Development Of Ground Station Software, Scott Kerlin, Jeremy Straub, Jacob Huhn, Alexander Lewis

Jeremy Straub

Communications security is gaining importance as small spacecraft include actuator capabilities (i.e., propulsion), payloads which could be misappropriated (i.e., high resolution cameras), and research missions with high value/cost. However, security is limited by capability, interoperability and regulation. Additionally, as the small satellite community becomes more mainstream and diverse, the lack of cheap, limited-to-no configuration, pluggable security modules for small satellites also presents a limit for user adoption of security.

This paper discusses a prospective approach for incorporating robust security into a student-developed ground station created at the University of North Dakota as part of a Computer Science Department senior design …