Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cybersecurity (3)
- CubeSat (2)
- Small Spacecraft (2)
- Artificial Intelligence & Robotic Control (1)
- Autonomous attack and defense (1)
-
- Blackboard Architecture (1)
- China (1)
- Command and control (1)
- Communications security (1)
- Cyber Attack (1)
- Cyber Espionage (1)
- Cyber Warfare (1)
- Cyber Weapons (1)
- Cyberdefense (1)
- Cyberwarfare (1)
- Ground Station Software (1)
- Ground station software (1)
- Hacking (1)
- IDS (1)
- Incremental Anomaly Detection (1)
- Intrusion Detection System (1)
- Malicious Intent (1)
- Military Conflict (1)
- Open Orbiter Project (1)
- OpenOrbiter (1)
- Operator Error (1)
- SCADA (1)
- Satellite Security (1)
- Spacecraft Communications (1)
- Stuxnet (1)
- Publication
Articles 1 - 6 of 6
Full-Text Articles in Physical Sciences and Mathematics
Ramping Down Chinese Commercial Cyber Espionage, Emilio Iasiello
Ramping Down Chinese Commercial Cyber Espionage, Emilio Iasiello
Emilio Iasiello
While detractors believe that commercial cyber espionage hasn’t really stopped, recent Chinese efforts show a government trying to get a handle on its large spying apparatus that could include hired and independent contractors acting autonomously in addition to its other resources. While complete cessation may never occur, significant timely reduction demonstrates Beijing’s willingness to work with the United States as a partner and not a pariah, and provides a foundation from which the two governments can move forward on other cyber security areas where incongruity persists.
Blackboard-Based Electronic Warfare System, Jeremy Straub
Blackboard-Based Electronic Warfare System, Jeremy Straub
Jeremy Straub
With internet-connected, SCADA and cyber-physical systems becoming the next battlefield for crime and warfare, technologies for defending and attacking these systems are growing in prevalence. For entities with significant asset collections that are prospectively vulnerable to this type of an attack, autonomous response, retaliation and attack capabilities are necessary to respond to a growing threat from numerous sectors. This paper presents a command and control technique for cyberwarfare based on the Blackboard Architecture. It discusses the utility of this approach and proposes a distributed command system that can run across multiple nodes of various types.
Improving Satellite Security Through Incremental Anomaly Detection On Large, Static Datasets, Connor Hamlet, Matthew Russell, Jeremy Straub, Scott Kerlin
Improving Satellite Security Through Incremental Anomaly Detection On Large, Static Datasets, Connor Hamlet, Matthew Russell, Jeremy Straub, Scott Kerlin
Jeremy Straub
Anomaly detection is a widely used technique to detect system intrusions. Anomaly detection in Intrusion Detection and Prevent Systems (IDPS) works by establishing a baseline of normal behavior and classifying points that are at a farther distance away as outliers. The result is an “anomaly score”, or how much a point is an outlier. Recent work has been performed which has examined use of anomaly detection in data streams [1]. We propose a new incremental anomaly detection algorithm which is up to 57,000x faster than the non-incremental version while slightly sacrificing the accuracy of results. We conclude that our method …
Scada System Security: Accounting For Operator Error And Malicious Intent, Ryan Kilbride, Jeremy Straub, Eunjin Kim
Scada System Security: Accounting For Operator Error And Malicious Intent, Ryan Kilbride, Jeremy Straub, Eunjin Kim
Jeremy Straub
Supervisory control and data acquisition (SCADA) systems are becoming more and more com-monplace in many industries today. Industries are making better use of software and large scale control systems to run efficiently, without the need for large amounts of oversight. Security is a particularly large issue with such systems, however. A human must still be involved to ensure smooth operation in the event of catastrophic system error, or unusual circumstanc-es. Human involvement presents problems: operators could make mistakes, configure the system to operate sub-optimally or take malicious actions. This imple-mentation of SCADA security aims to combat these problems.
Are Cyber Weapons Effective Military Tools?, Emilio Iasiello
Are Cyber Weapons Effective Military Tools?, Emilio Iasiello
Emilio Iasiello
Cyber-attacks are often viewed in academic and military writings as strategic asymmetric weapons, great equalizers with the potential of leveling the battlefield between powerful nations and those less capable. More substantive examples demonstrate that cyber-attacks have been more successful in non-military activities, as they may serve as a clandestine weapon of subterfuge better positioned to incapacitate systems without alerting the victims, veiling the orchestrator’s true identity via proxy groups and plausible deniability. Consequently, this paper provides a counter argument to the idea that cyber tools are instrumental military weapons in modern day warfare; cyber weapons are more effective options during …
Small Satellite Communications Security And Student Learning In The Development Of Ground Station Software, Scott Kerlin, Jeremy Straub, Jacob Huhn, Alexander Lewis
Small Satellite Communications Security And Student Learning In The Development Of Ground Station Software, Scott Kerlin, Jeremy Straub, Jacob Huhn, Alexander Lewis
Jeremy Straub
Communications security is gaining importance as small spacecraft include actuator capabilities (i.e., propulsion), payloads which could be misappropriated (i.e., high resolution cameras), and research missions with high value/cost. However, security is limited by capability, interoperability and regulation. Additionally, as the small satellite community becomes more mainstream and diverse, the lack of cheap, limited-to-no configuration, pluggable security modules for small satellites also presents a limit for user adoption of security.
This paper discusses a prospective approach for incorporating robust security into a student-developed ground station created at the University of North Dakota as part of a Computer Science Department senior design …