首页 > 最新文献

2011 IEEE International Conference on Technologies for Homeland Security (HST)最新文献

英文 中文
Low cost, pervasive detection of radiation threats 低成本,无处不在的辐射威胁检测
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107897
G. Drukier, E. Rubenstein, P. R. Solomon, M. Wójtowicz, M. Serio
The recent nuclear crisis at Fukushima, Japan is a stark reminder that radiation emergencies can and do happen. In addition to accidents, the potential use of radioactive materials by terrorists has raised serious concerns. While the primary concern has been with preventing these materials from entering the United States, thousands of dangerous radiological sources are already here within our borders, located in vulnerable locations in hospitals, food processing plants, and industrial sites. These sources pose a risk for use in two terrorist threats described by the Department of Health and Human Services (DHHS): the Dirty Bomb and the Silent Source. In a Dirty Bomb attack, radioactive material is dispersed using a conventional explosive. In a Silent Source attack, radioactive material is hidden in locations where people congregate (restaurants, airports, subway stations, shopping malls, etc.). Both scenarios can injure or kill people and cause significant political, social and economic disruption. This paper will describe the GammaPixTM technology, which has the potential to provide low cost, pervasive detection of, and warning against, radiation threats. The GammaPix technology is based on software analysis of the images produced by a surveillance or smartphone camera to measure the local gamma-ray radiation exposure at the device. The technology employs the inherent gamma-ray sensitivity of CCD and CMOS chips used in the digital image sensors of these devices. This paper describes the use of the technology in calibration and testing scenarios using installed video cameras and smartphone cameras.
最近发生在日本福岛的核危机清楚地提醒人们,辐射紧急情况可能而且确实会发生。除了事故之外,恐怖分子可能使用放射性物质也引起了严重关注。虽然主要关注的是防止这些材料进入美国,但在我们的境内已经有数千个危险的放射源,位于医院、食品加工厂和工业场所等易受伤害的地方。这些来源有可能用于卫生和人类服务部(DHHS)所描述的两种恐怖主义威胁:脏弹和无声来源。在“脏弹”攻击中,放射性物质是用常规炸药分散的。在无声源攻击中,放射性物质被隐藏在人们聚集的地方(餐馆、机场、地铁站、购物中心等)。这两种情况都可能造成人员伤亡,并造成重大的政治、社会和经济混乱。本文将描述GammaPixTM技术,该技术具有提供低成本,普适检测和警告辐射威胁的潜力。GammaPix技术基于对监控或智能手机摄像头产生的图像进行软件分析,以测量设备处的局部伽马射线辐射暴露。该技术利用了这些设备的数字图像传感器中使用的CCD和CMOS芯片固有的伽马射线灵敏度。本文描述了该技术在使用安装的摄像机和智能手机摄像头的校准和测试场景中的使用。
{"title":"Low cost, pervasive detection of radiation threats","authors":"G. Drukier, E. Rubenstein, P. R. Solomon, M. Wójtowicz, M. Serio","doi":"10.1109/THS.2011.6107897","DOIUrl":"https://doi.org/10.1109/THS.2011.6107897","url":null,"abstract":"The recent nuclear crisis at Fukushima, Japan is a stark reminder that radiation emergencies can and do happen. In addition to accidents, the potential use of radioactive materials by terrorists has raised serious concerns. While the primary concern has been with preventing these materials from entering the United States, thousands of dangerous radiological sources are already here within our borders, located in vulnerable locations in hospitals, food processing plants, and industrial sites. These sources pose a risk for use in two terrorist threats described by the Department of Health and Human Services (DHHS): the Dirty Bomb and the Silent Source. In a Dirty Bomb attack, radioactive material is dispersed using a conventional explosive. In a Silent Source attack, radioactive material is hidden in locations where people congregate (restaurants, airports, subway stations, shopping malls, etc.). Both scenarios can injure or kill people and cause significant political, social and economic disruption. This paper will describe the GammaPixTM technology, which has the potential to provide low cost, pervasive detection of, and warning against, radiation threats. The GammaPix technology is based on software analysis of the images produced by a surveillance or smartphone camera to measure the local gamma-ray radiation exposure at the device. The technology employs the inherent gamma-ray sensitivity of CCD and CMOS chips used in the digital image sensors of these devices. This paper describes the use of the technology in calibration and testing scenarios using installed video cameras and smartphone cameras.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115211167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Integrating equilibrium assignment in game-theoretic approach to measure many-to-many transportation network vulnerability 基于博弈论的多对多交通网络脆弱性测度的综合均衡分配
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107895
Qixing Wang, L. Fiondella, N. Lownes, J. Ivan, R. Ammar, S. Rajasekaran, S. Tolba
In transportation networks, the vulnerable links will be those which play a critical role and are therefore the most likely to be attacked. High-volume edges with few alternative paths represent obvious system vulnerabilities. Conflict between a terrorist organization and a transportation management agency can be characterized as two opponents who compete with each other to win a game. In this paper a mixed-strategy, stochastic game theoretic approach is presented to mathematically capture each player's strategy and predict the possible result. A game considering all possible origin-destination pairs is constructed between a router, which seeks to maximally ensure safety and efficiency for all travelers, and the tester, which seeks to maximally disrupt network performance by disabling links within the network. The User-equilibrium assignment is utilized for routing probabilities computing, while the Method of Successive Averages (MSA) is employed to update the link cost during the game play. The method is demonstrated on a small sample network and then applied to the Sioux Fall network and large scale city network of Anaheim, California.
在运输网络中,易受攻击的环节将是那些发挥关键作用的环节,因此最容易受到攻击。具有很少可选路径的大容量边缘表示明显的系统漏洞。恐怖组织和运输管理机构之间的冲突可以被描述为两个对手为了赢得比赛而相互竞争。本文提出了一种混合策略的随机博弈论方法,以数学方式捕获每个参与者的策略并预测可能的结果。在路由器和测试者之间构建了一个考虑所有可能的始发目的地对的博弈,前者寻求最大限度地确保所有旅行者的安全和效率,后者寻求最大限度地通过禁用网络中的链路来破坏网络性能。采用用户均衡分配计算路由概率,采用连续平均法(MSA)更新博弈过程中的链路开销。该方法在一个小样本网络上进行了验证,然后应用于苏福尔网络和加利福尼亚州阿纳海姆的大型城市网络。
{"title":"Integrating equilibrium assignment in game-theoretic approach to measure many-to-many transportation network vulnerability","authors":"Qixing Wang, L. Fiondella, N. Lownes, J. Ivan, R. Ammar, S. Rajasekaran, S. Tolba","doi":"10.1109/THS.2011.6107895","DOIUrl":"https://doi.org/10.1109/THS.2011.6107895","url":null,"abstract":"In transportation networks, the vulnerable links will be those which play a critical role and are therefore the most likely to be attacked. High-volume edges with few alternative paths represent obvious system vulnerabilities. Conflict between a terrorist organization and a transportation management agency can be characterized as two opponents who compete with each other to win a game. In this paper a mixed-strategy, stochastic game theoretic approach is presented to mathematically capture each player's strategy and predict the possible result. A game considering all possible origin-destination pairs is constructed between a router, which seeks to maximally ensure safety and efficiency for all travelers, and the tester, which seeks to maximally disrupt network performance by disabling links within the network. The User-equilibrium assignment is utilized for routing probabilities computing, while the Method of Successive Averages (MSA) is employed to update the link cost during the game play. The method is demonstrated on a small sample network and then applied to the Sioux Fall network and large scale city network of Anaheim, California.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125278114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
MIST: An operational ground surveillance camera MIST:一种可操作的地面监视摄像机
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107859
Jay Wilhelm, M. Gautam, S. Ronen
An aerial high resolution wide angle camera system capable of 3D mapping was developed with a possible application in assisting DHS border security and military reconnaissance. The goals of this system were to survey vast areas with a wide angle camera system and provide precise coordinate information. This system was designed with an UAV in mind as the flight vehicle, taking the risk away from pilots with a reduction to the cost of operation. Currently, existing aerial camera systems cannot provide wide angle and high resolution imagery from a UAV. Utilizing proven, state-of-the-art imaging methods and off-the-shelf components, a versatile and reliable camera system was developed by VisionMap Ltd. The camera, MIST, is a lightweight, high resolution, digital vertically and oblique-looking, photogrammetric-certified payload for tactical unmanned aircraft systems (T-UAS). Evaluation of the MIST was carried out by collaboration between West Virginia University researchers and VisionMap of Israel. An experiment was performed to collect high resolution 3D imagery, determine the accuracy of coordinates using known ground points, and to test the function of the camera using the MIST over Morgantown, WV, home of West Virginia University. Results were a set of very high 3D resolution images and high accuracy mapping points. This paper will discuss the current state-of-the-art-camera systems capable of UAV operation, the uniqueness and functionality of MIST, and the experiment performed at WVU using MIST.
开发了一种能够进行三维测绘的空中高分辨率广角摄像系统,可能用于协助国土安全部边境安全和军事侦察。该系统的目标是用广角相机系统测量广大地区,并提供精确的坐标信息。该系统被设计为一架无人机作为飞行载体,通过降低操作成本来降低飞行员的风险。目前,现有的航空摄像系统不能提供来自无人机的广角和高分辨率图像。利用成熟的,最先进的成像方法和现成的组件,VisionMap有限公司开发了一个多功能和可靠的相机系统。MIST是一种轻型、高分辨率、数字垂直和斜视、摄影测量认证的有效载荷,用于战术无人机系统(T-UAS)。MIST的评估是由西弗吉尼亚大学的研究人员和以色列视觉地图公司合作进行的。实验收集了高分辨率的3D图像,利用已知的地面点确定坐标的精度,并在西弗吉尼亚州摩根敦(西弗吉尼亚大学所在地)使用MIST测试了相机的功能。结果是一组非常高的三维分辨率图像和高精度的制图点。本文将讨论当前能够用于无人机操作的最先进的相机系统,MIST的独特性和功能,以及在WVU使用MIST进行的实验。
{"title":"MIST: An operational ground surveillance camera","authors":"Jay Wilhelm, M. Gautam, S. Ronen","doi":"10.1109/THS.2011.6107859","DOIUrl":"https://doi.org/10.1109/THS.2011.6107859","url":null,"abstract":"An aerial high resolution wide angle camera system capable of 3D mapping was developed with a possible application in assisting DHS border security and military reconnaissance. The goals of this system were to survey vast areas with a wide angle camera system and provide precise coordinate information. This system was designed with an UAV in mind as the flight vehicle, taking the risk away from pilots with a reduction to the cost of operation. Currently, existing aerial camera systems cannot provide wide angle and high resolution imagery from a UAV. Utilizing proven, state-of-the-art imaging methods and off-the-shelf components, a versatile and reliable camera system was developed by VisionMap Ltd. The camera, MIST, is a lightweight, high resolution, digital vertically and oblique-looking, photogrammetric-certified payload for tactical unmanned aircraft systems (T-UAS). Evaluation of the MIST was carried out by collaboration between West Virginia University researchers and VisionMap of Israel. An experiment was performed to collect high resolution 3D imagery, determine the accuracy of coordinates using known ground points, and to test the function of the camera using the MIST over Morgantown, WV, home of West Virginia University. Results were a set of very high 3D resolution images and high accuracy mapping points. This paper will discuss the current state-of-the-art-camera systems capable of UAV operation, the uniqueness and functionality of MIST, and the experiment performed at WVU using MIST.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126938990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Use of small imaging sonars for diver identification 使用小型成像声纳识别潜水员
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107881
A. Crawford, A. Percival, V. Crowe
Defence Research and Development Canada has recently wrapped up a 4-year project to demonstrate an integrated system for force protection in harbours, the Canadian Underwater Protection System (CUwPS). The intention of the Maritime Force Protection Technology Demonstration Project was to provide advice to the Canadian Navy on countering underwater threats to ships (divers, swimmers, AUVs) in harbours and anchorages. The project program was designed around a series of trials, which included a major international trial in Sydney, Australia, in February 2009, an evaluation for potential use in security measures for the 2010 Winter Olympics and participation in exercises prior to and during the International Fleet Review and Royal visit in July 2010. The CUwPS itself is comprised of COTS equipment with modest integration. A critical aspect of the CUwPS concept of operations is the requirement to positively identify threats that have been flagged by a wide-area-coverage diver detection sonar system. This is accomplished by tasking a response boat outfitted with a high resolution imaging sonar to investigate contacts or areas and if appropriate, to issue loud-hailer warnings. During the trials conducted through the course of the MFP TDP, several different small imaging sonars were tested for this identification role, with varying degrees of success. Assessment of the performance of the imaging sonars has been undertaken with the goal of obtaining an objective measure of the suitability of any one sonar for the identification task. The results of this assessment exercise will be presented along with some lessons learned.
加拿大国防研究与发展部最近完成了一项为期4年的项目,展示了一种用于港口部队保护的综合系统,即加拿大水下保护系统(CUwPS)。海上部队保护技术示范项目的目的是向加拿大海军提供建议,以应对港口和锚地对船只(潜水员、游泳者、auv)的水下威胁。该项目计划是围绕一系列试验设计的,其中包括2009年2月在澳大利亚悉尼举行的一次重大国际试验,2010年冬季奥运会安全措施的潜在用途评估,以及2010年7月国际舰队检阅和皇家访问之前和期间的参与演习。CUwPS本身由适度集成的COTS设备组成。CUwPS操作概念的一个关键方面是要求积极识别已被广域覆盖潜水员探测声纳系统标记的威胁。这是通过配备高分辨率成像声纳的响应船来完成的,该船可以调查接触点或区域,并在适当的时候发出扩音器警告。在MFP TDP的整个测试过程中,测试了几种不同的小型成像声纳的识别作用,取得了不同程度的成功。对成像声纳的性能进行了评估,目的是客观地衡量任何一种声纳对识别任务的适用性。这次评估工作的结果将与一些经验教训一起提出。
{"title":"Use of small imaging sonars for diver identification","authors":"A. Crawford, A. Percival, V. Crowe","doi":"10.1109/THS.2011.6107881","DOIUrl":"https://doi.org/10.1109/THS.2011.6107881","url":null,"abstract":"Defence Research and Development Canada has recently wrapped up a 4-year project to demonstrate an integrated system for force protection in harbours, the Canadian Underwater Protection System (CUwPS). The intention of the Maritime Force Protection Technology Demonstration Project was to provide advice to the Canadian Navy on countering underwater threats to ships (divers, swimmers, AUVs) in harbours and anchorages. The project program was designed around a series of trials, which included a major international trial in Sydney, Australia, in February 2009, an evaluation for potential use in security measures for the 2010 Winter Olympics and participation in exercises prior to and during the International Fleet Review and Royal visit in July 2010. The CUwPS itself is comprised of COTS equipment with modest integration. A critical aspect of the CUwPS concept of operations is the requirement to positively identify threats that have been flagged by a wide-area-coverage diver detection sonar system. This is accomplished by tasking a response boat outfitted with a high resolution imaging sonar to investigate contacts or areas and if appropriate, to issue loud-hailer warnings. During the trials conducted through the course of the MFP TDP, several different small imaging sonars were tested for this identification role, with varying degrees of success. Assessment of the performance of the imaging sonars has been undertaken with the goal of obtaining an objective measure of the suitability of any one sonar for the identification task. The results of this assessment exercise will be presented along with some lessons learned.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"123 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126127021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Database of high-Z signatures in cargo 货物高z信号数据库
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107899
Ron Bentley
Results from comprehensive testing of two prototype dual-energy (6 and 9 MeV) cargo inspection systems provide large databases of signature information of various high atomic number objects (active interrogation benchmarks) hidden in representative cargos. Test objects were fabricated from lead, tungsten and uranium ranging in size from 75 to 430,000 cm3. ISO containers were filled with eighteen selected cargos that varied in density and complexity. These databases, collected by the Domestic Nuclear Detection Office Cargo Advanced Automated Radiography System (CAARS) Program, provide a rich source of signature information that can be used to develop automated and user-assist detection algorithms.
对两套原型双能(6 MeV和9 MeV)货物检验系统的综合测试结果提供了隐藏在代表性货物中的各种高原子序数物体(主动审问基准)特征信息的大型数据库。测试物体由铅、钨和铀制成,尺寸从75到43万立方厘米不等。ISO集装箱装满了十八种不同密度和复杂程度的精选货物。这些数据库由国内核探测办公室货物先进自动放射照相系统(CAARS)项目收集,提供了丰富的签名信息来源,可用于开发自动化和用户辅助检测算法。
{"title":"Database of high-Z signatures in cargo","authors":"Ron Bentley","doi":"10.1109/THS.2011.6107899","DOIUrl":"https://doi.org/10.1109/THS.2011.6107899","url":null,"abstract":"Results from comprehensive testing of two prototype dual-energy (6 and 9 MeV) cargo inspection systems provide large databases of signature information of various high atomic number objects (active interrogation benchmarks) hidden in representative cargos. Test objects were fabricated from lead, tungsten and uranium ranging in size from 75 to 430,000 cm3. ISO containers were filled with eighteen selected cargos that varied in density and complexity. These databases, collected by the Domestic Nuclear Detection Office Cargo Advanced Automated Radiography System (CAARS) Program, provide a rich source of signature information that can be used to develop automated and user-assist detection algorithms.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129914906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Defining malware families based on analyst insights 根据分析人员的见解定义恶意软件家族
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107902
Jeffrey Gennari, David French
Determining whether arbitrary files are related to known malicious files is often useful in network and host-based defense. Doing so can give network defenders sufficient exemplars of a particular threat to develop comprehensive signatures and heuristics for identifying the threat, leading to decreased response time and improved prevention of a cyber attack. Identifying these malicious families is a complex process involving the categorization of potentially malicious code into sets that share similar features, while being distinguishable from unrelated threats or non-malicious code. Current methods for automatically or manually describing malware families are typically unable to distinguish between indicators derived from the structure of the malware and indicators derived from the behavior of the malware. Further, attempts to cluster potentially related files by mapping them into alternate domains, including histograms, fuzzy hashes, Bloom filters, and so on often produces clusters of files solely derived from structural information. These similarity measurements are often very effective on crudely similar files, yet they fail to identify files that have similar or identical behavior and semantics. We propose an analytic method, driven largely by human experience and based on objective criteria, for assigning arbitrary files membership in a malicious code family. We describe a process for iteratively refining the criteria used to select a malicious code family, until such criteria described are both necessary and sufficient to distinguish a particular malicious code family. We contrast this process with similar processes, such as antivirus signature generation and automatic and blind classification methods. We formalize this process to describe a roadmap for practitioners of malicious code analysis and to highlight opportunities for improvement and automation of both the process and the observation of relevant criteria. Finally, we provide experimental results of applying this methodology to real-world malware.
确定任意文件是否与已知的恶意文件有关,在基于网络和主机的防御中通常是有用的。这样做可以为网络防御者提供足够的特定威胁示例,以开发全面的签名和启发式方法来识别威胁,从而减少响应时间并改进对网络攻击的预防。识别这些恶意代码族是一个复杂的过程,包括将潜在恶意代码分类为具有相似特征的代码集,同时将其与不相关的威胁或非恶意代码区分开来。目前用于自动或手动描述恶意软件家族的方法通常无法区分源自恶意软件结构的指标和源自恶意软件行为的指标。此外,试图通过将潜在相关文件映射到其他域(包括直方图、模糊散列、Bloom过滤器等)来对它们进行聚类,通常会产生仅从结构信息派生的文件簇。这些相似性度量通常对大致相似的文件非常有效,但是它们无法识别具有相似或相同行为和语义的文件。我们提出了一种分析方法,主要由人类经验驱动并基于客观标准,用于分配恶意代码家族中的任意文件成员。我们描述了一个迭代细化用于选择恶意代码族的标准的过程,直到所描述的这些标准既必要又足以区分特定的恶意代码族。我们将此过程与类似的过程进行了对比,例如反病毒签名生成以及自动和盲分类方法。我们将此过程形式化,以描述恶意代码分析从业者的路线图,并强调改进和自动化过程以及观察相关标准的机会。最后,我们提供了将该方法应用于实际恶意软件的实验结果。
{"title":"Defining malware families based on analyst insights","authors":"Jeffrey Gennari, David French","doi":"10.1109/THS.2011.6107902","DOIUrl":"https://doi.org/10.1109/THS.2011.6107902","url":null,"abstract":"Determining whether arbitrary files are related to known malicious files is often useful in network and host-based defense. Doing so can give network defenders sufficient exemplars of a particular threat to develop comprehensive signatures and heuristics for identifying the threat, leading to decreased response time and improved prevention of a cyber attack. Identifying these malicious families is a complex process involving the categorization of potentially malicious code into sets that share similar features, while being distinguishable from unrelated threats or non-malicious code. Current methods for automatically or manually describing malware families are typically unable to distinguish between indicators derived from the structure of the malware and indicators derived from the behavior of the malware. Further, attempts to cluster potentially related files by mapping them into alternate domains, including histograms, fuzzy hashes, Bloom filters, and so on often produces clusters of files solely derived from structural information. These similarity measurements are often very effective on crudely similar files, yet they fail to identify files that have similar or identical behavior and semantics. We propose an analytic method, driven largely by human experience and based on objective criteria, for assigning arbitrary files membership in a malicious code family. We describe a process for iteratively refining the criteria used to select a malicious code family, until such criteria described are both necessary and sufficient to distinguish a particular malicious code family. We contrast this process with similar processes, such as antivirus signature generation and automatic and blind classification methods. We formalize this process to describe a roadmap for practitioners of malicious code analysis and to highlight opportunities for improvement and automation of both the process and the observation of relevant criteria. Finally, we provide experimental results of applying this methodology to real-world malware.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116206185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Dense radar networks for low-flyer surveillance 用于低空飞行监视的密集雷达网络
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107905
D. Pepyne, David J. McLaughlin, David Westbrook, Eric J. Lyons, Eric J. Knapp, S. Frasier, Michael Zink
The present inability to detect low-flying aircraft over international borders renders governments and citizens vulnerable to problems such as drug trafficking and illegal immigration. This paper describes an approach to comprehensive low-altitude surveillance based on networks of small radars being developed by the NSF Engineering Research Center for Collaborative Adaptive Sensing of the Atmosphere. We examine how low-cost networked radar technology might be applied to the public safety/security problem of detecting weather hazards while simultaneously supporting the border security mission of detecting and intercepting low-flying aircraft.
目前无法探测到国际边界上空低空飞行的飞机,这使得政府和公民容易受到毒品贩运和非法移民等问题的影响。本文介绍了美国国家科学基金会协同自适应大气传感工程研究中心正在开发的一种基于小型雷达网络的综合低空监测方法。我们研究了低成本联网雷达技术如何应用于探测天气灾害的公共安全/安保问题,同时支持探测和拦截低空飞行飞机的边境安全任务。
{"title":"Dense radar networks for low-flyer surveillance","authors":"D. Pepyne, David J. McLaughlin, David Westbrook, Eric J. Lyons, Eric J. Knapp, S. Frasier, Michael Zink","doi":"10.1109/THS.2011.6107905","DOIUrl":"https://doi.org/10.1109/THS.2011.6107905","url":null,"abstract":"The present inability to detect low-flying aircraft over international borders renders governments and citizens vulnerable to problems such as drug trafficking and illegal immigration. This paper describes an approach to comprehensive low-altitude surveillance based on networks of small radars being developed by the NSF Engineering Research Center for Collaborative Adaptive Sensing of the Atmosphere. We examine how low-cost networked radar technology might be applied to the public safety/security problem of detecting weather hazards while simultaneously supporting the border security mission of detecting and intercepting low-flying aircraft.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128634632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Multi-agent distributed dynamic scheduling for large distributed Critical Key Infrastructures and Resources (CKIR) surveillance and monitoring 面向大型分布式关键基础设施和资源(CKIR)监控的多智能体分布式动态调度
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107907
D. B. Megherbi, D. Xu
In many counterterrorism applications there is a need to protect Critical Key Infrastructures and Resources (CKIR) such as transportation systems, aviation, highway, maritime transportation, to name a few. In many of these applications, there is a need to secure hundreds of thousands to millions of miles of roadways and/or airways. To achieve the monitoring of such large CKIR systems there is a need to develop intelligent geographically and computationally distributed multi-agent based monitoring systems. The main focus of this paper is on issues related to agent scheduling in such a large multi-agent distributed system. We propose an architecture for the distributed dynamic agent communication based on the Message Passing Interface (MPI) and a dynamic scheduling algorithm. The goal of the proposed dynamic multi-agent multi-node data-aware scheduling algorithm is to minimize the system total execution time of the agents by dynamically balancing the computational load among different distributed nodes while scheduling the agents to run as much as possible on the computational nodes where data information, that the agents need to perform/finish their tasks, reside. The desired aim is to reduce data transfer overhead and latency, and therefore increase the overall system computational performance.
在许多反恐应用中,需要保护关键基础设施和资源(CKIR),如运输系统、航空、公路、海运等。在许多此类应用中,需要确保数十万至数百万英里的道路和/或航空公司的安全。为了实现对此类大型CKIR系统的监控,需要开发基于地理和计算分布式的智能多智能体监控系统。本文主要研究了大型多智能体分布式系统中的智能体调度问题。提出了一种基于消息传递接口(MPI)和动态调度算法的分布式动态代理通信体系结构。本文提出的动态多智能体多节点数据感知调度算法的目标是通过动态平衡不同分布式节点之间的计算负载,同时调度智能体尽可能多地在智能体执行/完成任务所需的数据信息驻留的计算节点上运行,从而最小化智能体的系统总执行时间。期望的目标是减少数据传输开销和延迟,从而提高系统的整体计算性能。
{"title":"Multi-agent distributed dynamic scheduling for large distributed Critical Key Infrastructures and Resources (CKIR) surveillance and monitoring","authors":"D. B. Megherbi, D. Xu","doi":"10.1109/THS.2011.6107907","DOIUrl":"https://doi.org/10.1109/THS.2011.6107907","url":null,"abstract":"In many counterterrorism applications there is a need to protect Critical Key Infrastructures and Resources (CKIR) such as transportation systems, aviation, highway, maritime transportation, to name a few. In many of these applications, there is a need to secure hundreds of thousands to millions of miles of roadways and/or airways. To achieve the monitoring of such large CKIR systems there is a need to develop intelligent geographically and computationally distributed multi-agent based monitoring systems. The main focus of this paper is on issues related to agent scheduling in such a large multi-agent distributed system. We propose an architecture for the distributed dynamic agent communication based on the Message Passing Interface (MPI) and a dynamic scheduling algorithm. The goal of the proposed dynamic multi-agent multi-node data-aware scheduling algorithm is to minimize the system total execution time of the agents by dynamically balancing the computational load among different distributed nodes while scheduling the agents to run as much as possible on the computational nodes where data information, that the agents need to perform/finish their tasks, reside. The desired aim is to reduce data transfer overhead and latency, and therefore increase the overall system computational performance.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128018798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modeling and simulation in support of understanding maritime security and defense capabilities and requirements (The maritime timeline and analysis requirements toolset (M-TART)) 支持理解海上安全和防御能力和需求的建模和仿真(海上时间表和分析需求工具集(M-TART))
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107845
N. Carson
Those responsible for the Maritime Security of North America face a daunting task. The breadth of activities in the maritime domain makes it very difficult to achieve an acceptable level of understanding and control. This leaves decision makers to deal with a multi-national challenge that is very much connected to the aerospace, land and cyberspace domains. In order for the decision makers responsible for the Maritime Security and Defense of North America to effectively execute their missions, they require both an understanding of their current capabilities and gaps, and a means to determine the capability requirements to close any identified gaps. This paper presents the Maritime Timeline Analysis and Requirements Toolset (M-TART) as a modeling and simulation solution to address this problem. The M-TART is a deterministic, scenario-based model that accounts for the various states of the maritime event timeline and provides decision makers with statistical and graphical information regarding current capabilities and gaps.
负责北美海上安全的人面临着一项艰巨的任务。海洋领域活动的广度使得很难达到可接受的理解和控制水平。这使得决策者不得不应对与航空航天、陆地和网络空间领域密切相关的多国挑战。为了让负责北美海上安全和防务的决策者有效地执行他们的任务,他们既需要了解他们当前的能力和差距,也需要一种确定能力需求以缩小任何已确定的差距的方法。本文提出了海事时间线分析和需求工具集(M-TART)作为解决这一问题的建模和仿真解决方案。M-TART是一种确定性的、基于场景的模型,它考虑了海上事件时间表的各种状态,并为决策者提供有关当前能力和差距的统计和图形信息。
{"title":"Modeling and simulation in support of understanding maritime security and defense capabilities and requirements (The maritime timeline and analysis requirements toolset (M-TART))","authors":"N. Carson","doi":"10.1109/THS.2011.6107845","DOIUrl":"https://doi.org/10.1109/THS.2011.6107845","url":null,"abstract":"Those responsible for the Maritime Security of North America face a daunting task. The breadth of activities in the maritime domain makes it very difficult to achieve an acceptable level of understanding and control. This leaves decision makers to deal with a multi-national challenge that is very much connected to the aerospace, land and cyberspace domains. In order for the decision makers responsible for the Maritime Security and Defense of North America to effectively execute their missions, they require both an understanding of their current capabilities and gaps, and a means to determine the capability requirements to close any identified gaps. This paper presents the Maritime Timeline Analysis and Requirements Toolset (M-TART) as a modeling and simulation solution to address this problem. The M-TART is a deterministic, scenario-based model that accounts for the various states of the maritime event timeline and provides decision makers with statistical and graphical information regarding current capabilities and gaps.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132522539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IntentFinder: A system for discovering significant information implicit in large, heterogeneous document collections and computationally mapping social networks and command nodes IntentFinder:一个系统,用于发现隐含在大型异构文档集合中的重要信息,并计算映射社会网络和命令节点
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107874
L. Ungar, S. Leibholz, C. Chaski
IntentFinder is a computational method of extracting mutually relevant information from a large collection of narrative data. We describe an approach that takes advantage of a new view of documents as coming from evolving stories. IntentFinder consists of six main components: 1) A document management system 2) A story extraction system 3) A significance determination system 4) A reputation management 5) A lexical-semantic analysis 6) A user interface In addition a method has been found for quantitatively determining the topology and hierarchy of a social subnetwork embedded inside a very noisy self-reorganizing network (e.g., the Internet). All these components will work together to allow analysts to discover and understand events and stories implicit in collections of documents, including newswire, reports, emails and tweets, which would be prohibitively difficult to uncover manually, and ultimately estimating the organizational structure of a social network.
IntentFinder是一种从大量叙事数据中提取相互相关信息的计算方法。我们描述了一种方法,该方法利用了来自不断发展的故事的文档的新视图。IntentFinder由六个主要组件组成:1)文档管理系统2)故事提取系统3)重要性确定系统4)声誉管理5)词汇语义分析6)用户界面此外,还发现了一种方法,用于定量确定嵌入在非常嘈杂的自重组网络(例如Internet)中的社会子网的拓扑结构和层次结构。所有这些组件将一起工作,使分析人员能够发现和理解隐含在文档集合中的事件和故事,包括新闻、报告、电子邮件和推文,这些将难以手工发现,并最终估计社交网络的组织结构。
{"title":"IntentFinder: A system for discovering significant information implicit in large, heterogeneous document collections and computationally mapping social networks and command nodes","authors":"L. Ungar, S. Leibholz, C. Chaski","doi":"10.1109/THS.2011.6107874","DOIUrl":"https://doi.org/10.1109/THS.2011.6107874","url":null,"abstract":"IntentFinder is a computational method of extracting mutually relevant information from a large collection of narrative data. We describe an approach that takes advantage of a new view of documents as coming from evolving stories. IntentFinder consists of six main components: 1) A document management system 2) A story extraction system 3) A significance determination system 4) A reputation management 5) A lexical-semantic analysis 6) A user interface In addition a method has been found for quantitatively determining the topology and hierarchy of a social subnetwork embedded inside a very noisy self-reorganizing network (e.g., the Internet). All these components will work together to allow analysts to discover and understand events and stories implicit in collections of documents, including newswire, reports, emails and tweets, which would be prohibitively difficult to uncover manually, and ultimately estimating the organizational structure of a social network.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"417 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124392797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2011 IEEE International Conference on Technologies for Homeland Security (HST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1