Pub Date : 2010-11-01DOI: 10.1109/WSSC.2010.5730279
Christina M. Rudzinski, D. Masters, A. Buck, Martha Wall, David Tremblay, E. Wack
Tens of millions of shipping containers enter U.S. seaports every year carrying commerce surpassing 1.5 trillion dollars in value. As a result, the maritime shipping industry offers an attractive channel for terrorist organizations to smuggle weapons of mass destruction into the U.S., or to cripple the U.S. economy by directly attacking major ports and maritime infrastructure. In order to prevent such an event from occurring, the Department of Homeland Security has initiated the SAFECON and TRUST programs aimed at improving security measures to detect anomalous goods such as these threats in container air. These programs are working to develop aggressive solutions that minimize any disruption to the flow of commerce by identifying or developing airsample based sensors that can be installed on port gantry cranes or housed within shipping containers themselves. This paper describes the DHS Container Security Test Bed that is being established at the Transportation Security Laboratory to enable realistic evaluation of technologies against real operational challenges. Information highlighting many of these challenges including the concentrations and movement of threat simulants inside containers, background clutter, operational environment, and air sampling capabilities will be presented. This information and the additional data that is being collected at the test bed will allow us to derive sensor and operational requirements and enable the intelligent design and selection of critical technologies.
{"title":"Screening maritime shipping containers for weapons of mass destruction","authors":"Christina M. Rudzinski, D. Masters, A. Buck, Martha Wall, David Tremblay, E. Wack","doi":"10.1109/WSSC.2010.5730279","DOIUrl":"https://doi.org/10.1109/WSSC.2010.5730279","url":null,"abstract":"Tens of millions of shipping containers enter U.S. seaports every year carrying commerce surpassing 1.5 trillion dollars in value. As a result, the maritime shipping industry offers an attractive channel for terrorist organizations to smuggle weapons of mass destruction into the U.S., or to cripple the U.S. economy by directly attacking major ports and maritime infrastructure. In order to prevent such an event from occurring, the Department of Homeland Security has initiated the SAFECON and TRUST programs aimed at improving security measures to detect anomalous goods such as these threats in container air. These programs are working to develop aggressive solutions that minimize any disruption to the flow of commerce by identifying or developing airsample based sensors that can be installed on port gantry cranes or housed within shipping containers themselves. This paper describes the DHS Container Security Test Bed that is being established at the Transportation Security Laboratory to enable realistic evaluation of technologies against real operational challenges. Information highlighting many of these challenges including the concentrations and movement of threat simulants inside containers, background clutter, operational environment, and air sampling capabilities will be presented. This information and the additional data that is being collected at the test bed will allow us to derive sensor and operational requirements and enable the intelligent design and selection of critical technologies.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128857829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/THS.2010.5655103
Nathaniel Boggs, Sharath Hiremagalore, A. Stavrou, S. Stolfo
We present our initial experimental findings from the collaborative deployment of network Anomaly Detection (AD) sensors. Our system examines the ingress http traffic and correlates AD alerts from two administratively disjoint domains: Columbia University and George Mason University. We show that, by exchanging packet content alerts between the two sites, we can achieve zero-day attack detection capabilities with a relatively small number of false positives. Furthermore, we empirically demonstrate that the vast majority of common abnormal data represent attack vectors rather than false positives. We posit that cross-site collaboration enables the automated detection of common abnormal data which are likely to ferret out zero-day attacks with high accuracy and minimal human intervention.
{"title":"Experimental results of cross-site exchange of web content Anomaly Detector alerts","authors":"Nathaniel Boggs, Sharath Hiremagalore, A. Stavrou, S. Stolfo","doi":"10.1109/THS.2010.5655103","DOIUrl":"https://doi.org/10.1109/THS.2010.5655103","url":null,"abstract":"We present our initial experimental findings from the collaborative deployment of network Anomaly Detection (AD) sensors. Our system examines the ingress http traffic and correlates AD alerts from two administratively disjoint domains: Columbia University and George Mason University. We show that, by exchanging packet content alerts between the two sites, we can achieve zero-day attack detection capabilities with a relatively small number of false positives. Furthermore, we empirically demonstrate that the vast majority of common abnormal data represent attack vectors rather than false positives. We posit that cross-site collaboration enables the automated detection of common abnormal data which are likely to ferret out zero-day attacks with high accuracy and minimal human intervention.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130193075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Dion, G. Denolfo, S. Hunter, S. Son, N. Guardala
We describe the Neutron Imaging Camera (NIC) being developed for the detection of special nuclear materials by NASA/GSFC and NSWC/Carderock. The NIC is a self-contained, robust, omni-directional and 3He-independent neutron detector based on the Three-Dimensional Track Imager (3-DTI) technology developed at GSFC for gamma-ray astrophysics applications. The 3-DTI is a large volume time-projection chamber that provides ∼ 0.4 mm resolution for the 3-D tracking of a charged particle. The incident direction of fast neutrons, 0.1 MeV < En < 10 MeV, are reconstructed from the momenta and energies of protons resulting from single and double scatters on methane (CH4). We present angular and energy resolution of the NIC derived from laboratory and accelerator testing.
本文介绍了NASA/GSFC和NSWC/Carderock正在研制的用于探测特殊核材料的中子成像照相机(NIC)。NIC是一个独立的、健壮的、全方位的、与3he无关的中子探测器,基于GSFC开发的用于伽马射线天体物理学应用的三维跟踪成像仪(3-DTI)技术。3-DTI是一个大体积的时间投影室,为带电粒子的三维跟踪提供~ 0.4 mm的分辨率。利用甲烷(CH4)单散射和双散射产生的质子动量和能量,重构了0.1 MeV < En < 10 MeV的快中子入射方向。我们给出了由实验室和加速器测试得出的NIC的角和能量分辨率。
{"title":"Neutron Imaging Camera","authors":"M. Dion, G. Denolfo, S. Hunter, S. Son, N. Guardala","doi":"10.1117/12.777167","DOIUrl":"https://doi.org/10.1117/12.777167","url":null,"abstract":"We describe the Neutron Imaging Camera (NIC) being developed for the detection of special nuclear materials by NASA/GSFC and NSWC/Carderock. The NIC is a self-contained, robust, omni-directional and 3He-independent neutron detector based on the Three-Dimensional Track Imager (3-DTI) technology developed at GSFC for gamma-ray astrophysics applications. The 3-DTI is a large volume time-projection chamber that provides ∼ 0.4 mm resolution for the 3-D tracking of a charged particle. The incident direction of fast neutrons, 0.1 MeV < En < 10 MeV, are reconstructed from the momenta and energies of protons resulting from single and double scatters on methane (CH4). We present angular and energy resolution of the NIC derived from laboratory and accelerator testing.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122666664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ths.2011.6107835
Israel Soibelman, Leader, R. Cunningham, Joseph Biondi, Howard A. Schmidt, Christopher Doyle, E. Starnes, Walker, Robert Griffin, T. A. Cellucci, Richard J Driggers, Track Speaker, Peter Fonash, Leslee Shumway, F. Molinet, R. Cunningham, Joseph Biondi, G. Larocque, Bob Alongi, Karen Krause, M. Chair, Cyber Security, Bob Hutchinson, J. Picciotto, W. Tirenin, Z. Tudor, M. Sri, Lincoln Zhivich, Laboratory, Stanley Pau, David Taylor, J. Contestabile, D. Schrader, A. Vidan, Lincoln Laboratory, K. Warren, L. Yang, R. Moro, Raytheon Rod Kunz, J. Oxley, K. Yasuda, Raytheon
On behalf of the Boston Section of the IEEE, welcome to the tenth Conference on Homeland Security Technologies. I believe that the conference Steering Committee has assembled a very interesting and relevant program which will provide perspective on the current state of the art and recent advances to address homeland security concerns. It is hard to overemphasize the importance of the topics in this conference which include the core technologies to protect our homeland against such threats as weapons of mass destruction or attacks on critical or key infrastructure, potential attacks against our cyber infrastructure, the protection of our borders and the preparation, recovery and response to natural disasters. In this context, the conference includes a broad range of peer reviewed papers that address critical challenges. A new track this year addresses business development and user experience in the area of homeland security. We also welcome, for the first time, the participation of the U.S. Naval Postgraduate School who will work with the authors of selected best papers to publish them in their Homeland Security Affairs journal. I think that the topics and speakers cover a highly relevant range of material and that this conference is a unique forum that will bring together government, industry and academia to share ideas on these critical topics. I also wish to acknowledge the substantial efforts of the IEEE and, in particular, the Bos-ton office in making this event a reality. Special recognition is also due to Mr. Lennart Long for his sustained leadership in this conference over the last several years. On behalf of the Boston Section of the IEEE and the entire HST 2010 technical committee , we want to introduce the exciting program that we have developed for you, and to tell you about some new developments. In this, the tenth year of the Conference on Homeland Security Technologies, we have made a few changes we hope will build on and improve the quality of what was already a strong program. We recognize that one of the unusual and valuable aspects of HST is how it brings together users, researchers, and members of the business and industrial communities. We realize that it is critical to maintain this rare, interdisciplinary blend. We know that at-tendees from many backgrounds come to learn about the state of the art and recent advances. Some attendees come to deepen their understanding of their own field, and …
{"title":"Westin hotel room layout","authors":"Israel Soibelman, Leader, R. Cunningham, Joseph Biondi, Howard A. Schmidt, Christopher Doyle, E. Starnes, Walker, Robert Griffin, T. A. Cellucci, Richard J Driggers, Track Speaker, Peter Fonash, Leslee Shumway, F. Molinet, R. Cunningham, Joseph Biondi, G. Larocque, Bob Alongi, Karen Krause, M. Chair, Cyber Security, Bob Hutchinson, J. Picciotto, W. Tirenin, Z. Tudor, M. Sri, Lincoln Zhivich, Laboratory, Stanley Pau, David Taylor, J. Contestabile, D. Schrader, A. Vidan, Lincoln Laboratory, K. Warren, L. Yang, R. Moro, Raytheon Rod Kunz, J. Oxley, K. Yasuda, Raytheon","doi":"10.1109/ths.2011.6107835","DOIUrl":"https://doi.org/10.1109/ths.2011.6107835","url":null,"abstract":"On behalf of the Boston Section of the IEEE, welcome to the tenth Conference on Homeland Security Technologies. I believe that the conference Steering Committee has assembled a very interesting and relevant program which will provide perspective on the current state of the art and recent advances to address homeland security concerns. It is hard to overemphasize the importance of the topics in this conference which include the core technologies to protect our homeland against such threats as weapons of mass destruction or attacks on critical or key infrastructure, potential attacks against our cyber infrastructure, the protection of our borders and the preparation, recovery and response to natural disasters. In this context, the conference includes a broad range of peer reviewed papers that address critical challenges. A new track this year addresses business development and user experience in the area of homeland security. We also welcome, for the first time, the participation of the U.S. Naval Postgraduate School who will work with the authors of selected best papers to publish them in their Homeland Security Affairs journal. I think that the topics and speakers cover a highly relevant range of material and that this conference is a unique forum that will bring together government, industry and academia to share ideas on these critical topics. I also wish to acknowledge the substantial efforts of the IEEE and, in particular, the Bos-ton office in making this event a reality. Special recognition is also due to Mr. Lennart Long for his sustained leadership in this conference over the last several years. On behalf of the Boston Section of the IEEE and the entire HST 2010 technical committee , we want to introduce the exciting program that we have developed for you, and to tell you about some new developments. In this, the tenth year of the Conference on Homeland Security Technologies, we have made a few changes we hope will build on and improve the quality of what was already a strong program. We recognize that one of the unusual and valuable aspects of HST is how it brings together users, researchers, and members of the business and industrial communities. We realize that it is critical to maintain this rare, interdisciplinary blend. We know that at-tendees from many backgrounds come to learn about the state of the art and recent advances. Some attendees come to deepen their understanding of their own field, and …","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116900709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}