首页 > 最新文献

MILCOM 2012 - 2012 IEEE Military Communications Conference最新文献

英文 中文
Sources of misinformation in Online Social Networks: Who to suspect? 在线社交网络中错误信息的来源:该怀疑谁?
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415780
Dung T. Nguyen, Nam P. Nguyen, M. Thai
Online Social Networks (OSNs) have recently emerged as one of the most effective channels for information sharing and discovery due to their ability of allowing users to read and create new content simultaneously. While this advantage provides users more rooms to decide which content to follow, it also makes OSNs fertile grounds for the wide spread of misinformation which can lead to undesirable consequences. In order to guarantee the trustworthiness of content sharing in OSNs, it is thus essential to have a strategic investigation on the first and foremost concern: the sources of misinformation. In this paper, we study k-Suspector problem which aims to identify the top k most suspected sources of misinformation. We propose two effective approaches namely ranking-based and optimization-based algorithms. We further extend our solutions to cope with the incompleteness of collected data as well as multiple attacks, which mostly occur in reality. Experimental results on real-world datasets show that our approaches achieve competitive detection ratios in a timely manner in comparison with available methods.
在线社交网络(Online Social Networks, OSNs)最近成为最有效的信息共享和发现渠道之一,因为它们允许用户同时阅读和创建新内容。虽然这一优势为用户提供了更多的空间来决定关注哪些内容,但它也使osn成为广泛传播错误信息的沃土,从而导致不良后果。因此,为了保证osn中内容共享的可信度,必须对错误信息的来源这一首要问题进行战略调查。在本文中,我们研究了k-怀疑问题,该问题旨在识别前k个最可疑的错误信息来源。我们提出了两种有效的方法,即基于排名和基于优化的算法。我们进一步扩展了我们的解决方案,以应对收集的数据不完整和多重攻击,这主要发生在现实中。在真实数据集上的实验结果表明,与现有方法相比,我们的方法在及时的检测率方面具有竞争力。
{"title":"Sources of misinformation in Online Social Networks: Who to suspect?","authors":"Dung T. Nguyen, Nam P. Nguyen, M. Thai","doi":"10.1109/MILCOM.2012.6415780","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415780","url":null,"abstract":"Online Social Networks (OSNs) have recently emerged as one of the most effective channels for information sharing and discovery due to their ability of allowing users to read and create new content simultaneously. While this advantage provides users more rooms to decide which content to follow, it also makes OSNs fertile grounds for the wide spread of misinformation which can lead to undesirable consequences. In order to guarantee the trustworthiness of content sharing in OSNs, it is thus essential to have a strategic investigation on the first and foremost concern: the sources of misinformation. In this paper, we study k-Suspector problem which aims to identify the top k most suspected sources of misinformation. We propose two effective approaches namely ranking-based and optimization-based algorithms. We further extend our solutions to cope with the incompleteness of collected data as well as multiple attacks, which mostly occur in reality. Experimental results on real-world datasets show that our approaches achieve competitive detection ratios in a timely manner in comparison with available methods.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"11 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91209491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
Adaptive-rate channel coding for packet radio systems with higher layer fountain coding 具有更高层喷泉编码的分组无线电系统的自适应速率信道编码
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415641
Jason D. Ellis, M. Pursley
We present and evaluate two low-complexity protocols for adaptive transmission in tactical packet radio systems that employ higher layer fountain codes. The adaptive-rate coding protocol is permitted to adjust the rate of the channel code between each pair of consecutive packets. The adaptive modulation and coding protocol can change the modulation between each pair of consecutive packets, but it can adjust the code rate only between consecutive frames of packets. Each protocol responds to dynamic fading and other time-varying propagation losses. For control of the adaptation, the protocols rely solely on a simple statistic derived by the receiver. They require no channel measurements, parameter estimates, pilot symbols, or training. The throughput performance of each protocol is evaluated for a Rayleigh fading channel modeled by a finite-state Markov chain. We show that our adaptive-rate coding protocol in tandem with higher layer fountain coding outperforms fountain coding with fixed-rate channel coding. We also compare the performance of our adaptive-rate coding protocol with the performance of a hypothetical ideal adaptive-rate coding protocol for which the transmitter is given perfect channel state information for the previous packet. We demonstrate that our protocol performs nearly as well as the ideal protocol.
我们提出并评估了战术分组无线电系统中采用更高层喷泉码的自适应传输的两种低复杂度协议。自适应速率编码协议允许在每对连续数据包之间调整信道码的速率。自适应调制和编码协议可以改变每对连续数据包之间的调制,但只能在数据包的连续帧之间调整码率。每个协议响应动态衰落和其他时变传播损失。对于自适应的控制,协议仅依赖于接收方得出的简单统计数据。它们不需要通道测量、参数估计、飞行员符号或训练。以有限状态马尔可夫链为模型,对瑞利衰落信道的吞吐量性能进行了评价。我们证明了我们的自适应速率编码协议与更高层喷泉编码串联优于固定速率信道编码的喷泉编码。我们还将我们的自适应速率编码协议的性能与假设的理想自适应速率编码协议的性能进行了比较,对于理想自适应速率编码协议,发送端可以获得前一个数据包的完美信道状态信息。我们证明了我们的协议几乎和理想协议一样好。
{"title":"Adaptive-rate channel coding for packet radio systems with higher layer fountain coding","authors":"Jason D. Ellis, M. Pursley","doi":"10.1109/MILCOM.2012.6415641","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415641","url":null,"abstract":"We present and evaluate two low-complexity protocols for adaptive transmission in tactical packet radio systems that employ higher layer fountain codes. The adaptive-rate coding protocol is permitted to adjust the rate of the channel code between each pair of consecutive packets. The adaptive modulation and coding protocol can change the modulation between each pair of consecutive packets, but it can adjust the code rate only between consecutive frames of packets. Each protocol responds to dynamic fading and other time-varying propagation losses. For control of the adaptation, the protocols rely solely on a simple statistic derived by the receiver. They require no channel measurements, parameter estimates, pilot symbols, or training. The throughput performance of each protocol is evaluated for a Rayleigh fading channel modeled by a finite-state Markov chain. We show that our adaptive-rate coding protocol in tandem with higher layer fountain coding outperforms fountain coding with fixed-rate channel coding. We also compare the performance of our adaptive-rate coding protocol with the performance of a hypothetical ideal adaptive-rate coding protocol for which the transmitter is given perfect channel state information for the previous packet. We demonstrate that our protocol performs nearly as well as the ideal protocol.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"30 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89832929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Scheduling vs. random access in frequency hopped airborne networks 跳频机载网络中的调度与随机访问
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415829
D. Ripplinger, A. Narula-Tam, K. Szeto
Airborne networks often use frequency hopping to be jam resistant. Because users are highly mobile and can have large propagation delays, otherwise orthogonal frequency hopping patterns appear asynchronous, and hop-by-hop collisions will occur. We compare the achievable throughput and delay of scheduling schemes versus random access schemes in this context via modeling and simulation. Because collisions occur even when nodes are scheduled at the slot level, much less throughput is attainable, as compared to the case of orthogonal hopping patterns. Random access achieves even less throughput because it cannot control exactly how many users are active in a slot, only the average. This results in scheduling offering roughly a 10% to 20% gain in throughput over random access, depending on parameters such as code block length, the number of frequencies hopped over, and the number of users. However, a static schedule, also known as Time Division Multiple Access or TDMA, is shown to have very large delays for high traffic loads. Dynamic scheduling can achieve the throughput of TDMA and the delay of random access, but it incurs additional overhead for coordination between users which may outweigh the throughput gain. Alternatively, random access with time hopping has the potential of achieving the throughput of TDMA, but at some cost of delay.
机载网络通常使用跳频来抵抗干扰。因为用户是高度移动的,并且可能有很大的传播延迟,否则正交跳频模式会出现异步,并且会发生跳间冲突。在这种情况下,我们通过建模和仿真比较了调度方案与随机访问方案的可实现吞吐量和延迟。因为即使在槽级调度节点时也会发生冲突,所以与正交跳频模式相比,可以实现的吞吐量要低得多。随机访问实现的吞吐量甚至更低,因为它不能精确控制插槽中有多少用户是活动的,只能控制平均值。这导致调度提供了比随机访问大约10%到20%的吞吐量增益,具体取决于代码块长度、跳过的频率数量和用户数量等参数。然而,静态调度,也称为时分多址(TDMA),对于高流量负载具有非常大的延迟。动态调度可以实现TDMA的吞吐量和随机接入的延迟,但它带来的额外的用户间协调开销可能超过吞吐量增益。另外,带时间跳变的随机存取有可能实现TDMA的吞吐量,但要付出一定的延迟代价。
{"title":"Scheduling vs. random access in frequency hopped airborne networks","authors":"D. Ripplinger, A. Narula-Tam, K. Szeto","doi":"10.1109/MILCOM.2012.6415829","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415829","url":null,"abstract":"Airborne networks often use frequency hopping to be jam resistant. Because users are highly mobile and can have large propagation delays, otherwise orthogonal frequency hopping patterns appear asynchronous, and hop-by-hop collisions will occur. We compare the achievable throughput and delay of scheduling schemes versus random access schemes in this context via modeling and simulation. Because collisions occur even when nodes are scheduled at the slot level, much less throughput is attainable, as compared to the case of orthogonal hopping patterns. Random access achieves even less throughput because it cannot control exactly how many users are active in a slot, only the average. This results in scheduling offering roughly a 10% to 20% gain in throughput over random access, depending on parameters such as code block length, the number of frequencies hopped over, and the number of users. However, a static schedule, also known as Time Division Multiple Access or TDMA, is shown to have very large delays for high traffic loads. Dynamic scheduling can achieve the throughput of TDMA and the delay of random access, but it incurs additional overhead for coordination between users which may outweigh the throughput gain. Alternatively, random access with time hopping has the potential of achieving the throughput of TDMA, but at some cost of delay.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90909068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A new DFT-based frequency estimator for single-tone complex sinusoidal signals 一种基于dft的单音复正弦信号频率估计方法
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415812
Luoyang Fang, Dongliang Duan, Liuqing Yang
Frequency estimation for single-tone complex sinusoidal signals under additive white Gaussian noise is a classical and fundamental problem in many applications, such as communications, radar, sonar and power systems. In this paper, we propose a new algorithm by interpolating discrete Fourier transform (DFT) samples. Different from other existing interpolation methods for frequency estimation, our algorithm is based on a much simpler expression and has mathematically tractable bias expression in closed form, which can potentially assist future bias correction. Simulations confirm that our proposed algorithm outperforms all existing alternatives in the literature with comparable complexity.
加性高斯白噪声下单音复正弦信号的频率估计是通信、雷达、声纳和电力系统中一个经典而基础的问题。本文提出了一种利用离散傅立叶变换(DFT)样本插值的新算法。与其他现有的频率估计插值方法不同,该算法基于一个更简单的表达式,并且具有数学上易于处理的封闭形式的偏差表达式,这可能有助于未来的偏差校正。仿真证实,我们提出的算法优于文献中所有具有相当复杂性的现有替代算法。
{"title":"A new DFT-based frequency estimator for single-tone complex sinusoidal signals","authors":"Luoyang Fang, Dongliang Duan, Liuqing Yang","doi":"10.1109/MILCOM.2012.6415812","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415812","url":null,"abstract":"Frequency estimation for single-tone complex sinusoidal signals under additive white Gaussian noise is a classical and fundamental problem in many applications, such as communications, radar, sonar and power systems. In this paper, we propose a new algorithm by interpolating discrete Fourier transform (DFT) samples. Different from other existing interpolation methods for frequency estimation, our algorithm is based on a much simpler expression and has mathematically tractable bias expression in closed form, which can potentially assist future bias correction. Simulations confirm that our proposed algorithm outperforms all existing alternatives in the literature with comparable complexity.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"15 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76885769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
NextVC2 — A next generation virtual world command and control 下一代虚拟世界命令和控制
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415834
Marco M. Carvalho, R. Ford
In this paper we introduce a new approach to Virtual World-based Command and Control environments for multi-domain operations. Our target scenario is a military coalition operation in a common operation setting. All coalition partners participate in a common virtual command and control environment while different operational contexts take place simultaneously, at different levels of information release. Context-dependent information release is regulated through policies that are seamlessly enforced by the command and control framework without requiring the explicit participation (or knowledge) of users. A prototype of the proposed capability was implemented and demonstrated as an extension to OpenSim. In this paper, we describe our approach, some details of our prototype implementation, and our preliminary capability demonstrations.
本文介绍了一种基于虚拟世界的多域作战指挥控制环境的新方法。我们的目标场景是在共同作战环境下的军事联合作战。所有联盟伙伴都参与一个共同的虚拟指挥和控制环境,而不同的作战背景同时发生,在不同的信息发布级别。与上下文相关的信息发布通过由命令和控制框架无缝执行的策略进行调节,而不需要用户的明确参与(或知识)。提出的功能的原型被实现并作为OpenSim的扩展进行了演示。在本文中,我们描述了我们的方法,我们的原型实现的一些细节,以及我们的初步能力演示。
{"title":"NextVC2 — A next generation virtual world command and control","authors":"Marco M. Carvalho, R. Ford","doi":"10.1109/MILCOM.2012.6415834","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415834","url":null,"abstract":"In this paper we introduce a new approach to Virtual World-based Command and Control environments for multi-domain operations. Our target scenario is a military coalition operation in a common operation setting. All coalition partners participate in a common virtual command and control environment while different operational contexts take place simultaneously, at different levels of information release. Context-dependent information release is regulated through policies that are seamlessly enforced by the command and control framework without requiring the explicit participation (or knowledge) of users. A prototype of the proposed capability was implemented and demonstrated as an extension to OpenSim. In this paper, we describe our approach, some details of our prototype implementation, and our preliminary capability demonstrations.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"57 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78055371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Synchronization performance using Scale Time Offset Robust Modulation 采用尺度时间偏移鲁棒调制的同步性能
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415613
John J. Windish
Scale Time Offset Robust Modulation (STORM) is a waveform design technique involving the simultaneous transmission of a base waveform as well as a time-scaled and time-delayed copy of that waveform. For some applications this technique is attractive as a possible candidate to enhance synchronization performance, due to the different tradeoffs of its performance properties. This paper first presents background for the STORM technique. From there, a theoretical analysis of the performance of STORM as a possible timing synchronization mechanism is presented.
尺度时偏鲁棒调制(STORM)是一种波形设计技术,涉及同时传输基本波形以及该波形的时间缩放和时间延迟副本。对于某些应用程序,由于其性能特性的不同权衡,该技术作为增强同步性能的可能候选方案很有吸引力。本文首先介绍了STORM技术的背景。在此基础上,从理论上分析了STORM作为一种可能的定时同步机制的性能。
{"title":"Synchronization performance using Scale Time Offset Robust Modulation","authors":"John J. Windish","doi":"10.1109/MILCOM.2012.6415613","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415613","url":null,"abstract":"Scale Time Offset Robust Modulation (STORM) is a waveform design technique involving the simultaneous transmission of a base waveform as well as a time-scaled and time-delayed copy of that waveform. For some applications this technique is attractive as a possible candidate to enhance synchronization performance, due to the different tradeoffs of its performance properties. This paper first presents background for the STORM technique. From there, a theoretical analysis of the performance of STORM as a possible timing synchronization mechanism is presented.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"174 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78016140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A game theoretic approach for security and Quality of Service (QoS) co-design in MANETs with cooperative communications 基于博弈论的协同通信manet安全与服务质量协同设计方法
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415562
D. Zheng, Helen Tang, F. Yu, Helen Tang
Cooperative communication is proposed to form a virtual MIMO system through strategic relay selection to improve communication quality in wireless networks, including mobile ad hoc networks (MANETs). Due to their unorganized and decentralized infrastructure, MANETs with cooperative communications (CO-MANETs) are vulnerable to attacks initiated on relays. Although encryption and authentication protocols may prevent compromised data transmission when a selected relay is attacked, their cost is high. In this paper, we propose a game theoretic approach to quantitatively analyze the attack strategies of the attacker so as to make rational decision on relay selection and the authentication parameter adaptation to reach the trade-off between security and Quality of Service (QoS) in CO-MANETs. Simulation results show the effectiveness of the proposed approach for security and QoS co-design in CO-MANETs.
为了提高无线网络(包括移动自组网)的通信质量,提出了通过战略性中继选择形成虚拟MIMO系统的协作通信方案。由于其无组织和分散的基础设施,具有合作通信的manet (co - manet)容易受到对中继发起的攻击。虽然当选定的中继受到攻击时,加密和认证协议可以防止受损的数据传输,但它们的成本很高。本文提出了一种博弈论方法来定量分析攻击者的攻击策略,从而在co - manet中继选择和认证参数适配方面做出合理决策,以达到安全与服务质量(QoS)之间的权衡。仿真结果表明了该方法在co- manet中安全性和QoS协同设计方面的有效性。
{"title":"A game theoretic approach for security and Quality of Service (QoS) co-design in MANETs with cooperative communications","authors":"D. Zheng, Helen Tang, F. Yu, Helen Tang","doi":"10.1109/MILCOM.2012.6415562","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415562","url":null,"abstract":"Cooperative communication is proposed to form a virtual MIMO system through strategic relay selection to improve communication quality in wireless networks, including mobile ad hoc networks (MANETs). Due to their unorganized and decentralized infrastructure, MANETs with cooperative communications (CO-MANETs) are vulnerable to attacks initiated on relays. Although encryption and authentication protocols may prevent compromised data transmission when a selected relay is attacked, their cost is high. In this paper, we propose a game theoretic approach to quantitatively analyze the attack strategies of the attacker so as to make rational decision on relay selection and the authentication parameter adaptation to reach the trade-off between security and Quality of Service (QoS) in CO-MANETs. Simulation results show the effectiveness of the proposed approach for security and QoS co-design in CO-MANETs.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"23 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73062153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Hamming Masks: Toward defending constrained networked systems 汉明掩码:迈向防御受限网络系统
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415796
Andrew D. Jurik, Shaun T. Hutton, J. Tarr
The ability of intrusion detection systems to identify anomalous behavior successfully has lagged behind their ability to recognize activity based on signatures. Anomaly detection techniques for enterprises typically use statistical traffic models to accommodate varying network traffic profiles and limit the volume of false alerts. We offer a set of characteristics to identify constrained networked systems in which we hypothesize that anomaly detection techniques are well suited and useful. We offer a specific, concrete approach, Hamming Masks, for identifying expected behavior in a constrained networked system and recognizing unexpected behavior. We demonstrate the applicability of Hamming Masks for two different data sets and find that the distinctions between the enterprise data set and the constrained networked system data set are large.
入侵检测系统成功识别异常行为的能力落后于基于签名识别活动的能力。企业的异常检测技术通常使用统计流量模型来适应不同的网络流量配置文件,并限制错误警报的数量。我们提供了一组特征来识别受约束的网络系统,我们假设异常检测技术非常适合和有用。我们提供了一个具体的,具体的方法,汉明面具,用于识别约束网络系统中的预期行为和识别意外行为。我们证明了汉明掩码对两种不同数据集的适用性,并发现企业数据集和受约束的网络系统数据集之间的区别很大。
{"title":"Hamming Masks: Toward defending constrained networked systems","authors":"Andrew D. Jurik, Shaun T. Hutton, J. Tarr","doi":"10.1109/MILCOM.2012.6415796","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415796","url":null,"abstract":"The ability of intrusion detection systems to identify anomalous behavior successfully has lagged behind their ability to recognize activity based on signatures. Anomaly detection techniques for enterprises typically use statistical traffic models to accommodate varying network traffic profiles and limit the volume of false alerts. We offer a set of characteristics to identify constrained networked systems in which we hypothesize that anomaly detection techniques are well suited and useful. We offer a specific, concrete approach, Hamming Masks, for identifying expected behavior in a constrained networked system and recognizing unexpected behavior. We demonstrate the applicability of Hamming Masks for two different data sets and find that the distinctions between the enterprise data set and the constrained networked system data set are large.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"30 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74852640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The trust engineering framework: Architecting native security to defend against the next generation threats 信任工程框架:构建本地安全性以防御下一代威胁
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415669
B. Farroha, D. Farroha
This study examines trust in the framework of service-based systems and discusses why it is difficult to achieve. We propose a discipline we term trust engineering, which considers the interactions of trust-enhancing technology, system architecture, and the development life cycle. The traditional view of security solutions have focused on preventing external threats such as malware in the forms of viruses, hackers and worms through perimeter from penetrating the organizations system where solutions that include firewalls and antivirus software were the leading mitigating techniques. While still aware of outside threats, companies are now coming to understand they can no longer ignore inside violations concerning data at rest or data on the move in order to protect the organization's private and confidential information. So information security and privacy is quickly becoming critical whether it is internal or external. This paper investigates trust-enhancing approaches, articulating a strategy based on three main thrusts: developing secure software systems (confidence), executing software in a protected, controlled environment (control), and monitoring software for cyber threats (discovery). Applying these three thrusts in combination with the proper architectural and life cycle perspective provides the best strategy for increasing our trust in software-based and service-based systems.
本研究考察了基于服务的系统框架中的信任,并讨论了信任难以实现的原因。我们提出了一个我们称之为信任工程的学科,它考虑了信任增强技术、系统架构和开发生命周期之间的相互作用。安全解决方案的传统观点侧重于防止外部威胁,例如病毒、黑客和蠕虫等形式的恶意软件通过边界渗透到组织系统中,其中包括防火墙和防病毒软件的解决方案是主要的缓解技术。虽然仍然意识到外部威胁,但公司现在开始明白,为了保护组织的私人和机密信息,他们不能再忽视与静态数据或移动数据有关的内部违规行为。因此,无论是内部还是外部,信息安全和隐私都迅速变得至关重要。本文研究了增强信任的方法,阐述了基于三个主要重点的策略:开发安全软件系统(信心),在受保护的受控环境中执行软件(控制),以及监控软件的网络威胁(发现)。将这三个要点与适当的体系结构和生命周期观点结合起来应用,为增加我们对基于软件和基于服务的系统的信任提供了最佳策略。
{"title":"The trust engineering framework: Architecting native security to defend against the next generation threats","authors":"B. Farroha, D. Farroha","doi":"10.1109/MILCOM.2012.6415669","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415669","url":null,"abstract":"This study examines trust in the framework of service-based systems and discusses why it is difficult to achieve. We propose a discipline we term trust engineering, which considers the interactions of trust-enhancing technology, system architecture, and the development life cycle. The traditional view of security solutions have focused on preventing external threats such as malware in the forms of viruses, hackers and worms through perimeter from penetrating the organizations system where solutions that include firewalls and antivirus software were the leading mitigating techniques. While still aware of outside threats, companies are now coming to understand they can no longer ignore inside violations concerning data at rest or data on the move in order to protect the organization's private and confidential information. So information security and privacy is quickly becoming critical whether it is internal or external. This paper investigates trust-enhancing approaches, articulating a strategy based on three main thrusts: developing secure software systems (confidence), executing software in a protected, controlled environment (control), and monitoring software for cyber threats (discovery). Applying these three thrusts in combination with the proper architectural and life cycle perspective provides the best strategy for increasing our trust in software-based and service-based systems.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"28 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79331522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Direction finding of a compromised node in a spread-spectrum network 扩频网络中受损节点的测向
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415599
D. Torrieri
When a spread-spectrum receiver in a network discovers that it is processing a jamming signal transmitted by a compromised node, its first response is to attempt to identify the compromised node. In this paper, an adaptive array is used to find the direction to the jamming source despite the presence of interference signals transmitted by both legitimate network nodes and external sources. Unlike other direction-finding algorithms, the desired-signal classification (DESIC) algorithm requires no information or special assumptions about the interference signals to effectively cancel them and find the desired direction. Simulation experiments show that the DESIC algorithm provides an excellent performance in many scenarios, even when the received signals cannot be resolved by the widely used MUSIC algorithm.
当网络中的扩频接收器发现它正在处理由受损节点传输的干扰信号时,它的第一反应是试图识别受损节点。本文采用自适应阵列,在合法网络节点和外部干扰源都存在干扰的情况下,寻找到干扰源的方向。与其他测向算法不同,期望信号分类(DESIC)算法不需要有关干扰信号的信息或特殊假设,即可有效地消除干扰信号并找到期望方向。仿真实验表明,在许多场景下,即使使用广泛使用的MUSIC算法无法解析接收到的信号,DESIC算法也能提供出色的性能。
{"title":"Direction finding of a compromised node in a spread-spectrum network","authors":"D. Torrieri","doi":"10.1109/MILCOM.2012.6415599","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415599","url":null,"abstract":"When a spread-spectrum receiver in a network discovers that it is processing a jamming signal transmitted by a compromised node, its first response is to attempt to identify the compromised node. In this paper, an adaptive array is used to find the direction to the jamming source despite the presence of interference signals transmitted by both legitimate network nodes and external sources. Unlike other direction-finding algorithms, the desired-signal classification (DESIC) algorithm requires no information or special assumptions about the interference signals to effectively cancel them and find the desired direction. Simulation experiments show that the DESIC algorithm provides an excellent performance in many scenarios, even when the received signals cannot be resolved by the widely used MUSIC algorithm.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"23 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84264667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
MILCOM 2012 - 2012 IEEE Military Communications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1