Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

OS and Networks

Old Dominion University

Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 50

Full-Text Articles in Physical Sciences and Mathematics

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka Apr 2024

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka

Cybersecurity Undergraduate Research Showcase

The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …


A Systemic Mapping Study On Intrusion Response Systems, Adel Rezapour, Mohammad Ghasemigol, Daniel Takabi Jan 2024

A Systemic Mapping Study On Intrusion Response Systems, Adel Rezapour, Mohammad Ghasemigol, Daniel Takabi

School of Cybersecurity Faculty Publications

With the increasing frequency and sophistication of network attacks, network administrators are facing tremendous challenges in making fast and optimum decisions during critical situations. The ability to effectively respond to intrusions requires solving a multi-objective decision-making problem. While several research studies have been conducted to address this issue, the development of a reliable and automated Intrusion Response System (IRS) remains unattainable. This paper provides a Systematic Mapping Study (SMS) for IRS, aiming to investigate the existing studies, their limitations, and future directions in this field. A novel semi-automated research methodology is developed to identify and summarize related works. The innovative …


Age Of Sensing Empowered Holographic Isac Framework For Nextg Wireless Networks: A Vae And Drl Approach, Apurba Adhikary, Avi Deb Raha, Yu Qiao, Md. Shirajum Munir, Monishanker Halder, Choong Seon Hong Jan 2024

Age Of Sensing Empowered Holographic Isac Framework For Nextg Wireless Networks: A Vae And Drl Approach, Apurba Adhikary, Avi Deb Raha, Yu Qiao, Md. Shirajum Munir, Monishanker Halder, Choong Seon Hong

School of Cybersecurity Faculty Publications

This paper proposes an artificial intelligence (AI) framework that leverages integrated sensing and communication (ISAC), aided by the age of sensing (AoS) to ensure the timely location updates of the users for a holographic MIMO (HMIMO)- enabled wireless network. The AI-driven framework guarantees optimal power allocation for efficient beamforming by activating the minimal number of grids from the HMIMO base station. An optimization problem is formulated to maximize the sensing utility function, aiming to maximize the signal-to-interference-plus-noise ratio (SINR) of the received signal, beam-pattern gains to improve the sensing SINR of reflected echo signals and maximizing the evidence lower bound …


Potential Security Vulnerabilities In Raspberry Pi Devices With Mitigation Strategies, Briana Tolleson Dec 2023

Potential Security Vulnerabilities In Raspberry Pi Devices With Mitigation Strategies, Briana Tolleson

Cybersecurity Undergraduate Research Showcase

For this research project I used a Raspberry Pi device and conducted online research to investigate potential security vulnerabilities along with mitigation strategies. I configured the Raspberry Pi by using the proper peripherals such as an HDMI cord, a microUSB adapter that provided 5V and at least 700mA of current, a TV monitor, PiSwitch, SD Card, keyboard, and mouse. I installed the Rasbian operating system (OS). The process to install the Rasbian took about 10 minutes to boot starting at 21:08 on 10/27/2023 and ending at 21:18. 1,513 megabytes (MB) was written to the SD card running at (2.5 MB/sec). …


The Propagation And Execution Of Malware In Images, Piper Hall Nov 2023

The Propagation And Execution Of Malware In Images, Piper Hall

Cybersecurity Undergraduate Research Showcase

Malware has become increasingly prolific and severe in its consequences as information systems mature and users become more reliant on computing in their daily lives. As cybercrime becomes more complex in its strategies, an often-overlooked manner of propagation is through images. In recent years, several high-profile vulnerabilities in image libraries have opened the door for threat actors to steal money and information from unsuspecting users. This paper will explore the mechanisms by which these exploits function and how they can be avoided.


Unmasking Deception In Vanets: A Decentralized Approach To Verifying Truth In Motion, Susan Zehra, Syed R. Rizvi, Steven Olariu Jan 2023

Unmasking Deception In Vanets: A Decentralized Approach To Verifying Truth In Motion, Susan Zehra, Syed R. Rizvi, Steven Olariu

College of Sciences Posters

VANET, which stands for "Vehicular Ad Hoc Network," is a wireless network that allows vehicles to communicate with each other and with infrastructure, such as Roadside Units (RSUs), with the aim of enhancing road safety and improving the overall driving experience through real-time exchange of information and data. VANET has various applications, including traffic management, road safety alerts, and navigation. However, the security of VANET can be compromised if a malicious user alters the content of messages transmitted, which can harm both individual vehicles and the overall trust in VANET technology. Ensuring the correctness of messages is crucial for the …


Joint Congestion And Contention Avoidance In A Scalable Qos-Aware Opportunistic Routing In Wireless Ad-Hoc Networks, Ali Parsa, Neda Moghim, Sasan Haghani Jan 2023

Joint Congestion And Contention Avoidance In A Scalable Qos-Aware Opportunistic Routing In Wireless Ad-Hoc Networks, Ali Parsa, Neda Moghim, Sasan Haghani

VMASC Publications

Opportunistic routing (OR) can greatly increase transmission reliability and network throughput in wireless ad-hoc networks by taking advantage of the broadcast nature of the wireless medium. However, network congestion is a barrier in the way of OR's performance improvement, and network congestion control is a challenge in OR algorithms, because only the pure physical channel conditions of the links are considered in forwarding decisions. This paper proposes a new method to control network congestion in OR, considering three types of parameters, namely, the backlogged traffic, the traffic flows' Quality of Service (QoS) level, and the channel occupancy rate. Simulation results …


Energy-Efficient Multi-Rate Opportunistic Routing In Wireless Mesh Networks, Mohammad Ali Mansouri Khah, Neda Moghim, Nasrin Gholami, Sachin Shetty Jan 2023

Energy-Efficient Multi-Rate Opportunistic Routing In Wireless Mesh Networks, Mohammad Ali Mansouri Khah, Neda Moghim, Nasrin Gholami, Sachin Shetty

VMASC Publications

Opportunistic or anypath routing protocols are focused on improving the performance of traditional routing in wireless mesh networks. They do so by leveraging the broadcast nature of the wireless medium and the spatial diversity of the network. Using a set of neighboring nodes, instead of a single specific node, as the next hop forwarder is a crucial aspect of opportunistic routing protocols, and the selection of the forwarder set plays a vital role in their performance. However, most opportunistic routing protocols consider a single transmission rate and power for the nodes, which limits their potential. To address this limitation, this …


Teaching Data Acquisition Through The Arduino-Driven Home Weather Station Project, Sheryl Dutton, Kurt Galderisi, Murat Kuzlu, Otilia Popescu, Vukica Jovanovic Jan 2023

Teaching Data Acquisition Through The Arduino-Driven Home Weather Station Project, Sheryl Dutton, Kurt Galderisi, Murat Kuzlu, Otilia Popescu, Vukica Jovanovic

Engineering Technology Faculty Publications

The main objective of this paper is to present one possible way to engage undergraduate students in designing a system that uses the Internet of Things (IoT) strategy for data acquisition and management. The MATLAB home weather station project presented here was developed by a team of students for the senior design course in the Electrical Engineering Technology undergraduate program at Old Dominion University (ODU). The main purpose of this project was for undergraduate students to learn how to create a localized, compact, and precise weather station. Utilizing various sensors, both homemade and sourced online, this weather station is capable …


Defending Ai-Based Automatic Modulation Recognition Models Against Adversarial Attacks, Haolin Tang, Ferhat Ozgur Catak, Murat Kuzlu, Evren Catak, Yanxiao Zhao Jan 2023

Defending Ai-Based Automatic Modulation Recognition Models Against Adversarial Attacks, Haolin Tang, Ferhat Ozgur Catak, Murat Kuzlu, Evren Catak, Yanxiao Zhao

Engineering Technology Faculty Publications

Automatic Modulation Recognition (AMR) is one of the critical steps in the signal processing chain of wireless networks, which can significantly improve communication performance. AMR detects the modulation scheme of the received signal without any prior information. Recently, many Artificial Intelligence (AI) based AMR methods have been proposed, inspired by the considerable progress of AI methods in various fields. On the one hand, AI-based AMR methods can outperform traditional methods in terms of accuracy and efficiency. On the other hand, they are susceptible to new types of cyberattacks, such as model poisoning or adversarial attacks. This paper explores the vulnerabilities …


Integration Of Omnet++ Into A Networking Course In An Electrical Engineering Technology Program, Murat Kuzlu, Brian Emmanuel Tamayo, Salih Sarp, Otilia Popescu, Vukica M. Jovanovic Jan 2023

Integration Of Omnet++ Into A Networking Course In An Electrical Engineering Technology Program, Murat Kuzlu, Brian Emmanuel Tamayo, Salih Sarp, Otilia Popescu, Vukica M. Jovanovic

Engineering Technology Faculty Publications

Networking courses are an integral part of electrical engineering technology programs as the majority of electronics in the modern day are required to communicate with each other. They are also getting more attention in manufacturing engineering technology programs because of the development of emerging technologies in Industry 4.0 arena. From laptops, computers, cellphones, modern day vehicles and smart refrigerators, these devices require a certain level of networking in order to communicate with other devices, whether it be locally, or even across the other side of the world. The objective of networking courses in an electrical engineering program is to demonstrate …


Dial "N" For Nxdomain: The Scale, Origin, And Security Implications Of Dns Queries To Non-Existent Domains, Gunnan Liu, Lin Jin, Shuai Hao, Yubao Zhang, Daiping Liu, Angelos Stavrou, Haining Wang Jan 2023

Dial "N" For Nxdomain: The Scale, Origin, And Security Implications Of Dns Queries To Non-Existent Domains, Gunnan Liu, Lin Jin, Shuai Hao, Yubao Zhang, Daiping Liu, Angelos Stavrou, Haining Wang

Computer Science Faculty Publications

Non-Existent Domain (NXDomain) is one type of the Domain Name System (DNS) error responses, indicating that the queried domain name does not exist and cannot be resolved. Unfortunately, little research has focused on understanding why and how NXDomain responses are generated, utilized, and exploited. In this paper, we conduct the first comprehensive and systematic study on NXDomain by investigating its scale, origin, and security implications. Utilizing a large-scale passive DNS database, we identify 146,363,745,785 NXDomains queried by DNS users between 2014 and 2022. Within these 146 billion NXDomains, 91 million of them hold historic WHOIS records, of which 5.3 million …


A Novel Parking Management In Smart City Vehicular Datacenters, Syed Rizvi, Susan Zehra, Steven Olariu Jan 2023

A Novel Parking Management In Smart City Vehicular Datacenters, Syed Rizvi, Susan Zehra, Steven Olariu

College of Sciences Posters

Researchers have shown that most vehicles spend the majority of their time parked in parking garages, lots, or driveways. During this time, their computing resources are unused and untapped. This has led to substantial interest in Vehicular Cloud, an area of research in which each vehicle acts as a computation node. The main difference between traditional cloud computing and vehicular cloud computing is the availability of nodes. In traditional clouds, nodes are available 24/7, while in vehicular clouds, nodes (vehicles) are only available while parked in parking lots. This creates a dynamic environment as vehicles enter and exit parking garages …


Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen Jan 2022

Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen

VMASC Publications

In addition to stresses induced by the Covid-19 pandemic, supply chains worldwide have been growing more complex while facing a continuous onslaught of disruptions. This paper presents an analysis and extension of a graph based model for modeling and simulating the effects of such disruptions. The graph based model combines a Bayesian network approach for simulating risks with a network dependency analysis approach for simulating the propagation of disruptions through the network over time. The initial analysis provides evidence supporting extension to for using a multi-layered approach allowing for the inclusion of cyclic features in supply chain models. Initial results …


Machine Learning-Based Event Generator For Electron-Proton Scattering, Y. Alanazi, P. Ambrozewicz, M. Battaglieri, A.N. Hiller Blin, M. P. Kuchera, Y. Li, T. Liu, R. E. Mcclellan, W. Melnitchouk, E. Pritchard, M. Robertson, N. Sato, R. Strauss, L. Velasco Jan 2022

Machine Learning-Based Event Generator For Electron-Proton Scattering, Y. Alanazi, P. Ambrozewicz, M. Battaglieri, A.N. Hiller Blin, M. P. Kuchera, Y. Li, T. Liu, R. E. Mcclellan, W. Melnitchouk, E. Pritchard, M. Robertson, N. Sato, R. Strauss, L. Velasco

Computer Science Faculty Publications

We present a new machine learning-based Monte Carlo event generator using generative adversarial networks (GANs) that can be trained with calibrated detector simulations to construct a vertex-level event generator free of theoretical assumptions about femtometer scale physics. Our framework includes a GAN-based detector folding as a fast-surrogate model that mimics detector simulators. The framework is tested and validated on simulated inclusive deep-inelastic scattering data along with existing parametrizations for detector simulation, with uncertainty quantification based on a statistical bootstrapping technique. Our results provide for the first time a realistic proof of concept to mitigate theory bias in inferring vertex-level event …


Security Hardening Of Intelligent Reflecting Surfaces Against Adversarial Machine Learning Attacks, Ferhat Ozgur Catak, Murat Kuzlu, Haolin Tang, Evren Catak, Yanxiao Zhao Jan 2022

Security Hardening Of Intelligent Reflecting Surfaces Against Adversarial Machine Learning Attacks, Ferhat Ozgur Catak, Murat Kuzlu, Haolin Tang, Evren Catak, Yanxiao Zhao

Engineering Technology Faculty Publications

Next-generation communication networks, also known as NextG or 5G and beyond, are the future data transmission systems that aim to connect a large amount of Internet of Things (IoT) devices, systems, applications, and consumers at high-speed data transmission and low latency. Fortunately, NextG networks can achieve these goals with advanced telecommunication, computing, and Artificial Intelligence (AI) technologies in the last decades and support a wide range of new applications. Among advanced technologies, AI has a significant and unique contribution to achieving these goals for beamforming, channel estimation, and Intelligent Reflecting Surfaces (IRS) applications of 5G and beyond networks. However, the …


Efficient Algorithms For Identifying Loop Formation And Computing Θ Value For Solving Minimum Cost Flow Network Problems, Timothy Michael Chávez, Duc Thai Nguyen Jan 2021

Efficient Algorithms For Identifying Loop Formation And Computing Θ Value For Solving Minimum Cost Flow Network Problems, Timothy Michael Chávez, Duc Thai Nguyen

Computational Modeling & Simulation Engineering Faculty Publications

While the minimum cost flow (MCF) problems have been well documented in many publications, due to its broad applications, little or no effort have been devoted to explaining the algorithms for identifying loop formation and computing the value needed to solve MCF network problems. This paper proposes efficient algorithms, and MATLAB computer implementation, for solving MCF problems. Several academic and real-life network problems have been solved to validate the proposed algorithms; the numerical results obtained by the developed MCF code have been compared and matched with the built-in MATLAB function Linprog() (Simplex algorithm) for further validation.


Image Source Identification Using Convolutional Neural Networks In Iot Environment, Yan Wang, Qindong Sun, Dongzhu Rong, Shancang Li, Li Da Xu Jan 2021

Image Source Identification Using Convolutional Neural Networks In Iot Environment, Yan Wang, Qindong Sun, Dongzhu Rong, Shancang Li, Li Da Xu

Information Technology & Decision Sciences Faculty Publications

Digital image forensics is a key branch of digital forensics that based on forensic analysis of image authenticity and image content. The advances in new techniques, such as smart devices, Internet of Things (IoT), artificial images, and social networks, make forensic image analysis play an increasing role in a wide range of criminal case investigation. This work focuses on image source identification by analysing both the fingerprints of digital devices and images in IoT environment. A new convolutional neural network (CNN) method is proposed to identify the source devices that token an image in social IoT environment. The experimental results …


Smart Parking Systems: Reviewing The Literature, Architecture And Ways Forward, Can Biyik, Zaheer Allam, Gabriele Pieri, Davide Moroni, Muftah O' Fraifer, Eoin O' Connell, Stephan Olariu, Muhammad Khalid Jan 2021

Smart Parking Systems: Reviewing The Literature, Architecture And Ways Forward, Can Biyik, Zaheer Allam, Gabriele Pieri, Davide Moroni, Muftah O' Fraifer, Eoin O' Connell, Stephan Olariu, Muhammad Khalid

Computer Science Faculty Publications

The Internet of Things (IoT) has come of age, and complex solutions can now be implemented seamlessly within urban governance and management frameworks and processes. For cities, growing rates of car ownership are rendering parking availability a challenge and lowering the quality of life through increased carbon emissions. The development of smart parking solutions is thus necessary to reduce the time spent looking for parking and to reduce greenhouse gas emissions. The principal role of this research paper is to analyze smart parking solutions from a technical perspective, underlining the systems and sensors that are available, as documented in the …


Automated Filtering Of Eye Movements Using Dynamic Aoi In Multiple Granularity Levels, Gavindya Jayawardena, Sampath Jayarathna Jan 2021

Automated Filtering Of Eye Movements Using Dynamic Aoi In Multiple Granularity Levels, Gavindya Jayawardena, Sampath Jayarathna

Computer Science Faculty Publications

Eye-tracking experiments involve areas of interest (AOIs) for the analysis of eye gaze data. While there are tools to delineate AOIs to extract eye movement data, they may require users to manually draw boundaries of AOIs on eye tracking stimuli or use markers to define AOIs. This paper introduces two novel techniques to dynamically filter eye movement data from AOIs for the analysis of eye metrics from multiple levels of granularity. The authors incorporate pre-trained object detectors and object instance segmentation models for offline detection of dynamic AOIs in video streams. This research presents the implementation and evaluation of object …


A Survey Of Enabling Technologies For Smart Communities, Amna Iqbal, Stephan Olariu Jan 2021

A Survey Of Enabling Technologies For Smart Communities, Amna Iqbal, Stephan Olariu

Computer Science Faculty Publications

In 2016, the Japanese Government publicized an initiative and a call to action for the implementation of a "Super Smart Society" announced as Society 5.0. The stated goal of Society 5.0 is to meet the various needs of the members of society through the provisioning of goods and services to those who require them, when they are required and in the amount required, thus enabling the citizens to live an active and comfortable life. In spite of its genuine appeal, details of a feasible path to Society 5.0 are conspicuously missing. The first main goal of this survey is to …


Study Of The Feasibility Of A Virtual Environment For Home User Cybersecurity, Sean Powell Jan 2020

Study Of The Feasibility Of A Virtual Environment For Home User Cybersecurity, Sean Powell

OUR Journal: ODU Undergraduate Research Journal

This research focuses on the average home computer user’s ability to download, install and manage a virtual machine software program. The findings of this research is to be used as a foundation to the possibility of using a virtual machine software program as another form of defense for the home user’s computer. Virtual machines already have various uses, some in the cybersecurity field; this possibility could add another useful application for the software program. This research is conducted by monitoring volunteers’ ability to download, install, set up, and perform basic instructions on the virtual environment. It was from the volunteers’ …


Generative Adversarial Networks For Visible To Infrared Video Conversion, Mohammad Shahab Uddin, Jiang Li, Chiman Kwan (Ed.) Jan 2020

Generative Adversarial Networks For Visible To Infrared Video Conversion, Mohammad Shahab Uddin, Jiang Li, Chiman Kwan (Ed.)

Electrical & Computer Engineering Faculty Publications

Deep learning models are data driven. For example, the most popular convolutional neural network (CNN) model used for image classification or object detection requires large labeled databases for training to achieve competitive performances. This requirement is not difficult to be satisfied in the visible domain since there are lots of labeled video and image databases available nowadays. However, given the less popularity of infrared (IR) camera, the availability of labeled infrared videos or image databases is limited. Therefore, training deep learning models in infrared domain is still challenging. In this chapter, we applied the pix2pix generative adversarial network (Pix2Pix GAN) …


A Blockchain Simulator For Evaluating Consensus Algorithms In Diverse Networking Environments, Peter Foytik, Sachin Shetty, Sarada Prasad Gochhayat, Eranga Herath, Deepak Tosh, Laurent Njilla Jan 2020

A Blockchain Simulator For Evaluating Consensus Algorithms In Diverse Networking Environments, Peter Foytik, Sachin Shetty, Sarada Prasad Gochhayat, Eranga Herath, Deepak Tosh, Laurent Njilla

VMASC Publications

The massive scale, heterogeneity and distributed nature of Internet-of-Things (IoT) presents challenges in realizing a practical and effective security solution. Blockchain empowered platforms and technologies have been proposed to address aspects of this challenge. In order to realize a practical Blockchain deployment for IoT, there is a need for a testing and evaluation platform to evaluate performance and security of Blockchain applications and systems. In this paper, we present a Blockchain simulator that evaluates the consensus algorithms in a realistic and configurable network environment. Though, there are several Blockchain evaluation platforms, they are either wedded to a specific consensus protocol …


Streaming Analytics And Workflow Automation For Dfs, Yasith Jayawardana, Sampath Jayarathna Jan 2020

Streaming Analytics And Workflow Automation For Dfs, Yasith Jayawardana, Sampath Jayarathna

Computer Science Faculty Publications

Researchers reuse data from past studies to avoid costly re-collection of experimental data. However, large-scale data reuse is challenging due to lack of consensus on metadata representations among research groups and disciplines. Dataset File System (DFS) is a semi-structured data description format that promotes such consensus by standardizing the semantics of data description, storage, and retrieval. In this paper, we present analytic-streams – a specification for streaming data analytics with DFS, and streaming-hub – a visual programming toolkit built on DFS to simplify data analysis work-flows. Analytic-streams facilitate higher-order data analysis with less computational overhead, while streaming-hub enables storage, retrieval, …


Keeping Anonymity At The Consumer Behavior On The Internet: Proof Of Sacrifice, Sachio Horie May 2019

Keeping Anonymity At The Consumer Behavior On The Internet: Proof Of Sacrifice, Sachio Horie

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

The evolution of the Internet and AI technology has made it possible for the government and the businesses to keep track of their personal lives. GAFA continues to collect information unintended by the individuals. It is a threat that our privacy is violated in this way. In order to solute such problems, it is important to consider a mechanism that enables us to be peaceful lives while protecting privacy in the Internet society.

This paper focuses on the consumption behavior on the Internet and addresses anonymity. We consider some network protocols that enable sustainable consensus by combining anonymity methods such …


Experimental Investigation On The Effects Of Website Aesthetics On User Performance In Different Virtual Tasks, Meinald T. Thielsch, Russell Haines, Leonie Flacke Jan 2019

Experimental Investigation On The Effects Of Website Aesthetics On User Performance In Different Virtual Tasks, Meinald T. Thielsch, Russell Haines, Leonie Flacke

Information Technology & Decision Sciences Faculty Publications

In Human-Computer Interaction research, the positive effect of aesthetics on users' subjective impressions and reactions is well-accepted. However, results regarding the influence of interface aesthetics on a user's individual performance as an objective outcome are very mixed, yet of urgent interest due to the proceeding of digitalization. In this web-based experiment (N = 331), the effect of interface aesthetics on individual performance considering three different types of tasks (search, creative, and transfer tasks) is investigated. The tasks were presented on an either aesthetic or unaesthetic website, which differed significantly in subjective aesthetics. Goal orientation (learning versus performance goals) was included …


Attacker Capability Based Dynamic Deception Model For Large-Scale Networks, Md Ali Reza Al Amin, Sachhin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua Jan 2019

Attacker Capability Based Dynamic Deception Model For Large-Scale Networks, Md Ali Reza Al Amin, Sachhin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua

Computational Modeling & Simulation Engineering Faculty Publications

In modern days, cyber networks need continuous monitoring to keep the network secure and available to legitimate users. Cyber attackers use reconnaissance mission to collect critical network information and using that information, they make an advanced level cyber-attack plan. To thwart the reconnaissance mission and counterattack plan, the cyber defender needs to come up with a state-of-the-art cyber defense strategy. In this paper, we model a dynamic deception system (DDS) which will not only thwart reconnaissance mission but also steer the attacker towards fake network to achieve a fake goal state. In our model, we also capture the attacker’s capability …


A Comparative Study On Machine Learning Algorithms For Network Defense, Abdinur Ali, Yen-Hung Hu, Chung-Chu (George) Hsieh, Mushtaq Khan Oct 2017

A Comparative Study On Machine Learning Algorithms For Network Defense, Abdinur Ali, Yen-Hung Hu, Chung-Chu (George) Hsieh, Mushtaq Khan

Virginia Journal of Science

Network security specialists use machine learning algorithms to detect computer network attacks and prevent unauthorized access to their networks. Traditionally, signature and anomaly detection techniques have been used for network defense. However, detection techniques must adapt to keep pace with continuously changing security attacks. Therefore, machine learning algorithms always learn from experience and are appropriate tools for this adaptation. In this paper, ten machine learning algorithms were trained with the KDD99 dataset with labels, then they were tested with different dataset without labels. The researchers investigate the speed and the efficiency of these machine learning algorithms in terms of several …


Advances On Software Defined Wireless Networking, D. B. Rawat, M. Song, C. Xin Jan 2017

Advances On Software Defined Wireless Networking, D. B. Rawat, M. Song, C. Xin

Electrical & Computer Engineering Faculty Publications

Software defined wireless networking is regarded as an emerging technology to enhance spectrum efficiency and improve the overall network performance. In this paper, we summarise the special issue on recent advances in software defined wireless networking. Specifically, this special issue publishes following findings: i) a novel context aware medium access control scheme for multichannel buffer-aided cognitive networks to reduce the delay by exploiting the packets’ contexts; ii) a utility-based uplink scheduling algorithm that accommodates different performance metrics and adapts its decisions based on user-specified profiles by incorporating an intermediary layer between the MAC and network layer; iii) an opportunistic spectrum …