首页 > 最新文献

2011 IEEE International Conference on Technologies for Homeland Security (HST)最新文献

英文 中文
Automated computer network defence technology demonstration project (ARMOUR TDP): Concept of operations, architecture, and integration framework 自动化计算机网络防御技术示范项目(armor TDP):操作、体系结构和集成框架的概念
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107865
R. Sawilla, D. Wiemer
Modern militaries rely heavily on computer networks and they have become a part of the critical infrastructure that must be protected. Computer networks, both military and non-military, are constantly being attacked and data about new vulnerabilities and attacks must be analyzed and processed at a speed that enables timely mitigation. The ARMOUR Technology Demonstration Project (TDP) is a five-year activity that will demonstrate automated Computer Network Defence (CND) capabilities based on the Observe, Orient, Decide and Act (OODA) decision process. We present the ARMOUR TDP Concept of Operations and Architecture, and promote an open source integration framework for collaborative development.
现代军队严重依赖计算机网络,它们已成为必须保护的关键基础设施的一部分。军事和非军事计算机网络不断受到攻击,必须以能够及时缓解的速度分析和处理有关新漏洞和攻击的数据。armor技术演示项目(TDP)是一项为期五年的活动,将演示基于观察、定位、决定和行动(OODA)决策过程的自动化计算机网络防御(CND)能力。我们提出了armor TDP的操作和体系结构概念,并促进了协作开发的开源集成框架。
{"title":"Automated computer network defence technology demonstration project (ARMOUR TDP): Concept of operations, architecture, and integration framework","authors":"R. Sawilla, D. Wiemer","doi":"10.1109/THS.2011.6107865","DOIUrl":"https://doi.org/10.1109/THS.2011.6107865","url":null,"abstract":"Modern militaries rely heavily on computer networks and they have become a part of the critical infrastructure that must be protected. Computer networks, both military and non-military, are constantly being attacked and data about new vulnerabilities and attacks must be analyzed and processed at a speed that enables timely mitigation. The ARMOUR Technology Demonstration Project (TDP) is a five-year activity that will demonstrate automated Computer Network Defence (CND) capabilities based on the Observe, Orient, Decide and Act (OODA) decision process. We present the ARMOUR TDP Concept of Operations and Architecture, and promote an open source integration framework for collaborative development.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130771887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Towards a privacy management framework for distributed cybersecurity in the new data ecology 面向新数据生态下分布式网络安全的隐私管理框架
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107840
T. Breaux, Catherine B. Lotrionte
Cyber security increasingly depends on advance notice of emerging threats as individuals, groups or nations attempt to exfiltrate information or disrupt systems and services. Advance notice relies on having access to the right information at the right time. This information includes trace digital evidence, distributed across public and private networks that are governed by various privacy policies, inter-agency agreements, federal and state laws and international treaties. To enable rapid and assured information sharing that protects privacy, the US government needs a means to balance privacy with the need to share. In this paper, we review US laws and policies governing government surveillance and describe key elements for a privacy management framework that seeks to enable government investigations while protecting privacy in a systematic way. The framework aligns existing Federal investigative guidelines for attributing a cyberattack with concerns for automated decision making that arise from the Fourth Amendment “reasonable expectation of privacy” and several fair information practice principles. We discuss technical challenges for those seeking to implement this framework.
随着个人、团体或国家试图窃取信息或破坏系统和服务,网络安全越来越依赖于对新出现威胁的提前通知。提前通知依赖于在正确的时间获得正确的信息。这些信息包括可追踪的数字证据,分布在公共和私人网络上,这些网络受各种隐私政策、机构间协议、联邦和州法律以及国际条约的管辖。为了在保护隐私的前提下实现快速、可靠的信息共享,美国政府需要一种平衡隐私与共享需求的方法。在本文中,我们回顾了美国管理政府监督的法律和政策,并描述了隐私管理框架的关键要素,该框架旨在使政府调查成为可能,同时以系统的方式保护隐私。该框架将现有的联邦调查指导方针与第四修正案“对隐私的合理期望”和几项公平信息实践原则所产生的自动决策的担忧联系起来,以确定网络攻击的原因。我们将讨论那些寻求实施该框架的人所面临的技术挑战。
{"title":"Towards a privacy management framework for distributed cybersecurity in the new data ecology","authors":"T. Breaux, Catherine B. Lotrionte","doi":"10.1109/THS.2011.6107840","DOIUrl":"https://doi.org/10.1109/THS.2011.6107840","url":null,"abstract":"Cyber security increasingly depends on advance notice of emerging threats as individuals, groups or nations attempt to exfiltrate information or disrupt systems and services. Advance notice relies on having access to the right information at the right time. This information includes trace digital evidence, distributed across public and private networks that are governed by various privacy policies, inter-agency agreements, federal and state laws and international treaties. To enable rapid and assured information sharing that protects privacy, the US government needs a means to balance privacy with the need to share. In this paper, we review US laws and policies governing government surveillance and describe key elements for a privacy management framework that seeks to enable government investigations while protecting privacy in a systematic way. The framework aligns existing Federal investigative guidelines for attributing a cyberattack with concerns for automated decision making that arise from the Fourth Amendment “reasonable expectation of privacy” and several fair information practice principles. We discuss technical challenges for those seeking to implement this framework.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132436791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A texture-based method for identificaiton of retinal vasculature 基于纹理的视网膜血管识别方法
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107908
V. Gottemukkula, S. Saripalle, Reza Derakshani, S. P. Tankasala
Noting the advantages of texture-based features over the structural descriptors of vascular trees, we investigated texture-based features from gray level cooccurrence matrix (GLCM) and various wavelet packet energies to classify retinal vasculature for biometric identification. Wavelet packet energy features were generated by Daubechies, Coiflets and Reverse Biorthogonal wavelets. Two different entropy methods, Shannon and logarithm of energy, were used to prune wavelet packet decomposition trees. Next, wrapper methods were used for classification-guided feature selection. Features were ranked based on area under the receiver operating curves, Bhattacharya, and t-test metrics. Using the ranked lists, wrapper methods were used in conjunction with Naïve Bayesian, k-nearest neighbor (k-NN), and Support Vector Machine (SVM) classifiers. Best results were achieved by using features from Reverse Biorthogonal 2.4 wavelet packet decomposition in conjunction with a nearest neighbor classifier, yielding a 3-fold cross validation accuracy of 99.42% with a sensitivity and specificity of 98.33% and 99.47% respectively.
考虑到纹理特征相对于血管树结构描述符的优势,我们研究了基于灰度协同矩阵(GLCM)和各种小波包能量的纹理特征对视网膜血管进行生物识别分类。小波包能量特征分别由Daubechies、coiflet和反向双正交小波生成。采用Shannon熵和对数熵两种不同的熵方法对小波包分解树进行剪枝。其次,使用包装器方法进行分类引导的特征选择。根据受试者工作曲线下的面积、Bhattacharya和t检验指标对特征进行排序。使用排名列表,包装器方法与Naïve贝叶斯,k-最近邻(k-NN)和支持向量机(SVM)分类器结合使用。将反向双正交2.4小波包分解特征与最近邻分类器结合使用,获得了最佳结果,交叉验证准确率为99.42%,灵敏度和特异性分别为98.33%和99.47%。
{"title":"A texture-based method for identificaiton of retinal vasculature","authors":"V. Gottemukkula, S. Saripalle, Reza Derakshani, S. P. Tankasala","doi":"10.1109/THS.2011.6107908","DOIUrl":"https://doi.org/10.1109/THS.2011.6107908","url":null,"abstract":"Noting the advantages of texture-based features over the structural descriptors of vascular trees, we investigated texture-based features from gray level cooccurrence matrix (GLCM) and various wavelet packet energies to classify retinal vasculature for biometric identification. Wavelet packet energy features were generated by Daubechies, Coiflets and Reverse Biorthogonal wavelets. Two different entropy methods, Shannon and logarithm of energy, were used to prune wavelet packet decomposition trees. Next, wrapper methods were used for classification-guided feature selection. Features were ranked based on area under the receiver operating curves, Bhattacharya, and t-test metrics. Using the ranked lists, wrapper methods were used in conjunction with Naïve Bayesian, k-nearest neighbor (k-NN), and Support Vector Machine (SVM) classifiers. Best results were achieved by using features from Reverse Biorthogonal 2.4 wavelet packet decomposition in conjunction with a nearest neighbor classifier, yielding a 3-fold cross validation accuracy of 99.42% with a sensitivity and specificity of 98.33% and 99.47% respectively.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131072472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Integrated aviation security for defense-in-depth of next generation air transportation system 面向下一代航空运输系统纵深防御的综合航空安全保障
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107860
Winston Li, Pan Kamal
To meet the significant increase in civil air traffic demand in the National Airspace System (NAS), the Federal Aviation Administration (FAA) is cooperating with other departments to develop Next Generation Air Transportation System (NextGen). NextGen will greatly increase the NAS capacity, efficiency, safety, flexibility, and environmental protection. Aviation Security is one of the core components in NextGen. Without security protection, all NextGen functions will be vulnerable to various attacks and cannot work robustly. In this paper, we propose an Integrated Aviation Security (IAS) framework for defense-in-depth of various aspects of NextGen security such as cyber security and aircraft anti-hijacking. IAS uses a multi-layered, cross-component, and multi-planed (data plane and control plane) structure. Multiple components in NextGen such as communication, navigation, surveillance, air traffic management, aircraft anti-hijacking, access control, biometrics, risk analysis and management, etc, are processed integratedly through information fusion to enhance the security performance of each module. We will present a detailed implementation approach of IAS including the AlertEnterprise based Integrated Risk Management (IRM) Model, defense-in-depth of communication, navigation, surveillance, and aircraft anti-hijacking. Compared with disparate systems, the proposed IAS has much higher security performance to be effective against both outsider and insider threats.
为了满足国家空域系统(NAS)中民用航空交通需求的显著增长,美国联邦航空管理局(FAA)正在与其他部门合作开发下一代航空运输系统(NextGen)。NextGen将大大提高NAS的容量、效率、安全性、灵活性和环保性。航空安全是NextGen的核心组成部分之一。如果没有安全保护,所有NextGen功能都容易受到各种攻击,无法健壮地工作。在本文中,我们提出了一个综合航空安全(IAS)框架,用于下一代安全的各个方面,如网络安全和飞机反劫持。IAS采用多层、跨组件、多平面(数据平面和控制平面)的结构。NextGen中的通信、导航、监控、空中交通管理、飞机防劫持、门禁、生物识别、风险分析与管理等多个组件通过信息融合进行综合处理,提升各个模块的安全性能。我们将详细介绍IAS的实施方法,包括基于alertenenterprise的综合风险管理(IRM)模型、通信、导航、监视和飞机反劫持的纵深防御。与完全不同的系统相比,所建议的IAS具有更高的安全性能,可以有效地应对外部和内部威胁。
{"title":"Integrated aviation security for defense-in-depth of next generation air transportation system","authors":"Winston Li, Pan Kamal","doi":"10.1109/THS.2011.6107860","DOIUrl":"https://doi.org/10.1109/THS.2011.6107860","url":null,"abstract":"To meet the significant increase in civil air traffic demand in the National Airspace System (NAS), the Federal Aviation Administration (FAA) is cooperating with other departments to develop Next Generation Air Transportation System (NextGen). NextGen will greatly increase the NAS capacity, efficiency, safety, flexibility, and environmental protection. Aviation Security is one of the core components in NextGen. Without security protection, all NextGen functions will be vulnerable to various attacks and cannot work robustly. In this paper, we propose an Integrated Aviation Security (IAS) framework for defense-in-depth of various aspects of NextGen security such as cyber security and aircraft anti-hijacking. IAS uses a multi-layered, cross-component, and multi-planed (data plane and control plane) structure. Multiple components in NextGen such as communication, navigation, surveillance, air traffic management, aircraft anti-hijacking, access control, biometrics, risk analysis and management, etc, are processed integratedly through information fusion to enhance the security performance of each module. We will present a detailed implementation approach of IAS including the AlertEnterprise based Integrated Risk Management (IRM) Model, defense-in-depth of communication, navigation, surveillance, and aircraft anti-hijacking. Compared with disparate systems, the proposed IAS has much higher security performance to be effective against both outsider and insider threats.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115708647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A rapid method for detecting geographically disconnected areas after disasters 灾后快速探测地理上不相连地区的方法
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107919
Ling-Jyh Chen, Chia-Wei Li, Yu-Te Huang, C. Shih
In this paper, we present a novel solution called Internet Footprint Investigation (IFI) for the rapid detection of network outages after a natural or man-made disaster. IFI is comprised of two components: 1) the Active Network Probing (ANP) module, which proactively probes the network infrastructure to detect geographic areas that may be disconnected; and 2) the Reactive Footprint Search (RFS) module, a reactive mechanism that improves the accuracy of the ANP results by incorporating the footprints of location-based social networks (LBSNs) established after a disaster occurs. Using Typhoon Morakot, which struck Taiwan in August 2009, as a case study, we implement the IFI system and evaluate its feasibility in a real-world scenario. We observe that the accuracy of existing IP geolocation services is unsatisfactory, and posit that localized IP geolocation services should be deployed and maintained all the times. Moreover, we demonstrate how existing LBSNs can be used to search for disaster victims in areas reported by ANP, and identify so-called “critical areas,” which have no Internet activity, for priority inspection. The proposed IFI solution is simple and effective, and it can be deployed worldwide.
在本文中,我们提出了一种新的解决方案,称为互联网足迹调查(IFI),用于在自然或人为灾难后快速检测网络中断。IFI由两个部分组成:1)主动网络探测(ANP)模块,主动探测网络基础设施以检测可能断开连接的地理区域;2)反应性足迹搜索(Reactive Footprint Search, RFS)模块,这是一种反应性机制,通过整合灾难发生后建立的基于位置的社交网络(LBSNs)的足迹,提高ANP结果的准确性。以2009年8月莫拉克台风袭击台湾为例,我们实施了IFI系统,并评估了其在现实世界中的可行性。我们观察到现有IP地理定位服务的准确性不理想,并提出本地化IP地理定位服务应始终部署和维护。此外,我们还演示了如何使用现有的LBSNs在ANP报告的地区搜索灾难受害者,并确定没有互联网活动的所谓“关键地区”进行优先检查。拟议的IFI解决方案简单有效,可在全球范围内部署。
{"title":"A rapid method for detecting geographically disconnected areas after disasters","authors":"Ling-Jyh Chen, Chia-Wei Li, Yu-Te Huang, C. Shih","doi":"10.1109/THS.2011.6107919","DOIUrl":"https://doi.org/10.1109/THS.2011.6107919","url":null,"abstract":"In this paper, we present a novel solution called Internet Footprint Investigation (IFI) for the rapid detection of network outages after a natural or man-made disaster. IFI is comprised of two components: 1) the Active Network Probing (ANP) module, which proactively probes the network infrastructure to detect geographic areas that may be disconnected; and 2) the Reactive Footprint Search (RFS) module, a reactive mechanism that improves the accuracy of the ANP results by incorporating the footprints of location-based social networks (LBSNs) established after a disaster occurs. Using Typhoon Morakot, which struck Taiwan in August 2009, as a case study, we implement the IFI system and evaluate its feasibility in a real-world scenario. We observe that the accuracy of existing IP geolocation services is unsatisfactory, and posit that localized IP geolocation services should be deployed and maintained all the times. Moreover, we demonstrate how existing LBSNs can be used to search for disaster victims in areas reported by ANP, and identify so-called “critical areas,” which have no Internet activity, for priority inspection. The proposed IFI solution is simple and effective, and it can be deployed worldwide.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124295770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Tunable, self-curing polymers for the forensic collection of latent signatures from within porous materials 可调的自固化聚合物,用于从多孔材料中收集潜在特征
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107885
Joseph E. Chipuk, Carolyn L. Mazzitelli, J. Kendall, Stephen D. Straight, Melissa A. Reaves, Sara C. Chamberlin
Self-curing polysiloxane polymers have been developed for the forensic collection of latent signatures of explosives, organophosphates, and their degradation products. These polymeric materials penetrate the sample substrate as viscous liquids and subsequently harden to a semi-soft solid that can be peeled away from the substrate to extract signatures via the non-covalent interaction of the newly formed polymeric material with the analytes buried within the substrate. This paper discusses experiments aimed at altering the chemical and physical properties of the polysiloxane sampling materials to optimize signature recovery from porous substrates. The utility of this approach is demonstrated by the collection of explosives, organophosphates, and their degradation products from within concrete. The recovery of these signatures using the self curing polymeric formulations is compared to current operational sampling alternatives such as adhesive fingerprint lifters and swabs. Demonstration of the preparation, extraction, and analytical methods for the detection of the target compounds is also be presented.
自固化聚硅氧烷聚合物已被开发用于爆炸物、有机磷酸盐及其降解产物的潜在特征的法医收集。这些聚合物材料以粘性液体的形式穿透样品基底,随后硬化为半软固体,可以通过新形成的聚合物材料与埋藏在基底内的分析物的非共价相互作用从基底上剥离,以提取特征。本文讨论了旨在改变聚硅氧烷样品材料的化学和物理性质的实验,以优化多孔基底的特征恢复。从混凝土中收集炸药、有机磷酸盐及其降解产物证明了这种方法的实用性。使用自固化聚合物配方的这些特征的恢复与目前的操作取样替代方案(如粘合剂指纹提升器和拭子)进行了比较。演示了制备、提取和检测目标化合物的分析方法。
{"title":"Tunable, self-curing polymers for the forensic collection of latent signatures from within porous materials","authors":"Joseph E. Chipuk, Carolyn L. Mazzitelli, J. Kendall, Stephen D. Straight, Melissa A. Reaves, Sara C. Chamberlin","doi":"10.1109/THS.2011.6107885","DOIUrl":"https://doi.org/10.1109/THS.2011.6107885","url":null,"abstract":"Self-curing polysiloxane polymers have been developed for the forensic collection of latent signatures of explosives, organophosphates, and their degradation products. These polymeric materials penetrate the sample substrate as viscous liquids and subsequently harden to a semi-soft solid that can be peeled away from the substrate to extract signatures via the non-covalent interaction of the newly formed polymeric material with the analytes buried within the substrate. This paper discusses experiments aimed at altering the chemical and physical properties of the polysiloxane sampling materials to optimize signature recovery from porous substrates. The utility of this approach is demonstrated by the collection of explosives, organophosphates, and their degradation products from within concrete. The recovery of these signatures using the self curing polymeric formulations is compared to current operational sampling alternatives such as adhesive fingerprint lifters and swabs. Demonstration of the preparation, extraction, and analytical methods for the detection of the target compounds is also be presented.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"8 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120935602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Visualization, modeling and predictive analysis of cyber security attacks against cyber infrastructure-oriented systems 针对面向网络基础设施的系统的网络安全攻击的可视化、建模和预测分析
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107851
J. Walker, Travis Jones, R. Blount
Cyber security threats require rapid identification of imminent or potential attacks to support deterrence and protection. Thomas Friedman theorized that technology has leveled or “flattened” the global playing field that once existed. This flattening has happened as a result of what he calls the “triple convergence” of platform, process and people. However, there is a general lack of understanding about how to describe, assess the complex and dynamic nature of cyber security related information to improve overall cyber security task performance. Ever since the first computer virus traversed the Internet it has been apparent that attacks can spread rapidly across national boundaries. This paper presents research that utilize bioinformatics techniques, to forecast cyber security attacks by identifying emerging threats based on analysis of computer infection, and incursions models based on human disease models.
网络安全威胁需要快速识别迫在眉睫或潜在的攻击,以支持威慑和保护。托马斯·弗里德曼(Thomas Friedman)的理论认为,技术已经使曾经存在的全球竞争环境变得平坦或“扁平化”。这种扁平化是他所说的平台、流程和人员“三重融合”的结果。然而,人们普遍缺乏对如何描述、评估网络安全相关信息的复杂性和动态性以提高整体网络安全任务绩效的理解。自从第一个计算机病毒在互联网上传播以来,很明显,攻击可以跨越国界迅速传播。本文介绍了利用生物信息学技术来预测网络安全攻击的研究,通过分析计算机感染和基于人类疾病模型的入侵模型来识别新出现的威胁。
{"title":"Visualization, modeling and predictive analysis of cyber security attacks against cyber infrastructure-oriented systems","authors":"J. Walker, Travis Jones, R. Blount","doi":"10.1109/THS.2011.6107851","DOIUrl":"https://doi.org/10.1109/THS.2011.6107851","url":null,"abstract":"Cyber security threats require rapid identification of imminent or potential attacks to support deterrence and protection. Thomas Friedman theorized that technology has leveled or “flattened” the global playing field that once existed. This flattening has happened as a result of what he calls the “triple convergence” of platform, process and people. However, there is a general lack of understanding about how to describe, assess the complex and dynamic nature of cyber security related information to improve overall cyber security task performance. Ever since the first computer virus traversed the Internet it has been apparent that attacks can spread rapidly across national boundaries. This paper presents research that utilize bioinformatics techniques, to forecast cyber security attacks by identifying emerging threats based on analysis of computer infection, and incursions models based on human disease models.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"338 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116337511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Hazard Mitigation, Materiel and Equipment Restoration (HaMMER) Advanced Technology Demonstration (ATD) 减灾、物料及设备修复(HaMMER)先进技术示范(ATD)
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107867
M. Saxon, Richard Rossman, Kevin Yontosh, Gregory Merboth
Battelle is the systems integrator on the Hazard Mitigation, Materiel and Equipment Restoration (HaMMER) Advanced Technology Demonstration (ATD) which is demonstrating integrated systems of decontaminants, applicators, and processes for recovery after a chemical or biological (CB) attack. Solutions have been developed using live agent testing and feedback from the user community. The HaMMER ATD is funded by the DTRA Joint Science and Technology Office and sponsored by the U.S. Pacific Command. The Joint Project Manager for Protection is the Transition Manager, and the U.S. Army Edgewood Chemical Biological Center serves as the Technical Manager. The HaMMER ATD focuses on three areas: • Agent disclosure — to provide a visual indication of the extent of contamination • Strippable coatings — pre-applied to mitigate contact and vapor hazards • Custom decontamination solutions that provide a dial-a-decon capability To date, the work has identified technologies that, when collectively applied, reduce or eliminate CB hazards following an attack. Technologies are grouped into suites targeted for mobile, stationary, and preparatory employment. HaMMER products will be considered for transition into the Decontamination Family of Systems (DFoS), using HaMMER test results for risk reduction. Beyond testing new technologies and systems, the program also provides a test bed to introduce new test protocols and operational methods. The HaMMER FoS consists of mobile, stationary, and support suites. The mobile suites focus on technologies that can be carried and employed on-the-move, while the stationary suite focuses on technologies that can be deployed to support field operations. The support suite provides the capability to apply preparatory measures prior to mission deployment. For the military, program benefits include: • New components and technologies that may replace or supplement existing decontamination equipment under current doctrine (near-term) • New FoS employed under new Concept of Operations (CONOPS) (mid-term) • Flexible configurations to address specific problems and operational needs • Incorporation of user feedback to ensure the suitability of the products These benefits and lessons learned from the program are easily translated into similar benefits for emergency responders and other homeland security professionals.
Battelle是危害缓解、材料和设备修复(HaMMER)先进技术演示(ATD)的系统集成商,该演示演示了化学或生物(CB)攻击后的净化、应用和恢复过程的集成系统。使用实时代理测试和来自用户社区的反馈开发了解决方案。HaMMER ATD由DTRA联合科学技术办公室资助,由美国太平洋司令部赞助。联合保护项目经理担任过渡经理,美国陆军埃奇伍德化学生物中心担任技术经理。HaMMER ATD侧重于三个方面:试剂披露——提供污染程度的视觉指示;可剥离涂层——预先应用,以减轻接触和蒸汽危害;定制去污解决方案,提供“dial-a-decon”功能。迄今为止,该工作已经确定了一些技术,当这些技术共同应用时,可以减少或消除攻击后的CB危害。技术被分为针对移动、固定和准备工作的套件。HaMMER产品将考虑过渡到净化系统系列(dfo),使用HaMMER测试结果来降低风险。除了测试新技术和新系统之外,该项目还提供了一个试验台,以引入新的测试协议和操作方法。HaMMER fo由移动、固定和支持套件组成。移动套件侧重于可以在移动中携带和使用的技术,而固定套件侧重于可以部署以支持现场作业的技术。支助套件提供了在部署特派团之前应用准备措施的能力。对于军方来说,项目的好处包括:•在当前原则下可取代或补充现有去污设备的新组件和技术(近期)•在新操作概念(CONOPS)下采用的新fo(中期)•灵活配置以解决特定问题和操作需求•纳入用户反馈以确保产品的适用性这些从该计划中吸取的好处和经验教训很容易转化为应急响应人员和其他国家的类似好处安全专家。
{"title":"Hazard Mitigation, Materiel and Equipment Restoration (HaMMER) Advanced Technology Demonstration (ATD)","authors":"M. Saxon, Richard Rossman, Kevin Yontosh, Gregory Merboth","doi":"10.1109/THS.2011.6107867","DOIUrl":"https://doi.org/10.1109/THS.2011.6107867","url":null,"abstract":"Battelle is the systems integrator on the Hazard Mitigation, Materiel and Equipment Restoration (HaMMER) Advanced Technology Demonstration (ATD) which is demonstrating integrated systems of decontaminants, applicators, and processes for recovery after a chemical or biological (CB) attack. Solutions have been developed using live agent testing and feedback from the user community. The HaMMER ATD is funded by the DTRA Joint Science and Technology Office and sponsored by the U.S. Pacific Command. The Joint Project Manager for Protection is the Transition Manager, and the U.S. Army Edgewood Chemical Biological Center serves as the Technical Manager. The HaMMER ATD focuses on three areas: • Agent disclosure — to provide a visual indication of the extent of contamination • Strippable coatings — pre-applied to mitigate contact and vapor hazards • Custom decontamination solutions that provide a dial-a-decon capability To date, the work has identified technologies that, when collectively applied, reduce or eliminate CB hazards following an attack. Technologies are grouped into suites targeted for mobile, stationary, and preparatory employment. HaMMER products will be considered for transition into the Decontamination Family of Systems (DFoS), using HaMMER test results for risk reduction. Beyond testing new technologies and systems, the program also provides a test bed to introduce new test protocols and operational methods. The HaMMER FoS consists of mobile, stationary, and support suites. The mobile suites focus on technologies that can be carried and employed on-the-move, while the stationary suite focuses on technologies that can be deployed to support field operations. The support suite provides the capability to apply preparatory measures prior to mission deployment. For the military, program benefits include: • New components and technologies that may replace or supplement existing decontamination equipment under current doctrine (near-term) • New FoS employed under new Concept of Operations (CONOPS) (mid-term) • Flexible configurations to address specific problems and operational needs • Incorporation of user feedback to ensure the suitability of the products These benefits and lessons learned from the program are easily translated into similar benefits for emergency responders and other homeland security professionals.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117068147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Operationalizing the coordinated incident handling model 实施协调事件处理模型
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107886
R. Daley, Thomas Millar, M. Osorno
Cyber threats are becoming increasingly sophisticated and subtle, making them even harder to detect and contain, and the number of critical, often simultaneous cyber incidents continues to rise at an alarming rate. In this environment, coordinated incident handling across a variety of organizations and incidents is essential for effective response. Current approaches use linear processes developed to handle single incidents with little attention paid to simultaneous or complex attacks encompassing many incidents, to coordination with other organizations, or the ability to scale to the size necessary for large, cross-cutting incidents. We have developed a coordination model for cyber incident management that provides enough structure to enable cooperative operations, but is sufficiently abstract to enable the organizational autonomy and customization essential for effective response for all types of organizations. It is easily understood, straightforward to apply, and versatile enough to overlay on existing organizational processes and structures, both for small, local activities as well as large, cross-organizational ones. This model will enable faster recognition and more rapid escalation of important cyber incidents as well as improving knowledge about such incidents for organizational peers across the community, further enhancing their local response capabilities.
网络威胁正变得越来越复杂和微妙,使得它们更难被发现和控制,而关键的、通常同时发生的网络事件的数量继续以惊人的速度增长。在这种环境中,跨各种组织和事件的协调事件处理对于有效响应至关重要。当前的方法使用线性流程来处理单个事件,很少关注包含许多事件的同时或复杂的攻击,与其他组织的协调,或扩展到大型跨部门事件所需的规模的能力。我们已经为网络事件管理开发了一个协调模型,该模型提供了足够的结构来支持合作操作,但又足够抽象,以实现组织自治和定制,这对于所有类型的组织都是有效响应所必需的。它很容易理解,直接应用,并且足够通用,可以覆盖在现有的组织过程和结构上,既适用于小型的、本地的活动,也适用于大型的、跨组织的活动。该模型将能够更快地识别和更迅速地升级重要的网络事件,并提高整个社区组织同行对此类事件的了解,进一步提高他们的本地响应能力。
{"title":"Operationalizing the coordinated incident handling model","authors":"R. Daley, Thomas Millar, M. Osorno","doi":"10.1109/THS.2011.6107886","DOIUrl":"https://doi.org/10.1109/THS.2011.6107886","url":null,"abstract":"Cyber threats are becoming increasingly sophisticated and subtle, making them even harder to detect and contain, and the number of critical, often simultaneous cyber incidents continues to rise at an alarming rate. In this environment, coordinated incident handling across a variety of organizations and incidents is essential for effective response. Current approaches use linear processes developed to handle single incidents with little attention paid to simultaneous or complex attacks encompassing many incidents, to coordination with other organizations, or the ability to scale to the size necessary for large, cross-cutting incidents. We have developed a coordination model for cyber incident management that provides enough structure to enable cooperative operations, but is sufficiently abstract to enable the organizational autonomy and customization essential for effective response for all types of organizations. It is easily understood, straightforward to apply, and versatile enough to overlay on existing organizational processes and structures, both for small, local activities as well as large, cross-organizational ones. This model will enable faster recognition and more rapid escalation of important cyber incidents as well as improving knowledge about such incidents for organizational peers across the community, further enhancing their local response capabilities.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125729430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Face recognition despite missing information 缺失信息的人脸识别
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107915
Charlie K. Dagli, K. Brady, Daniel C. Halbert
Missing or degraded information continues to be a significant practical challenge facing automatic face representation and recognition. Generally, existing approaches seek either to generatively invert the degradation process or find discriminative representations that are immune to it. Ideally, the solution to this problem exists between these two perspectives. To this end, in this paper we show the efficacy of using probabilistic linear subspace models (in particular variational probabilistic PCA) for both modeling and recognizing facial data under disguise or occlusion. From a discriminative perspective, we verify the efficacy of this approach for attenuating the effect of missing data due to disguise and non-linear speculars in several verification experiments. From a generative view, we show its usefulness in not only estimating missing information, but also understanding facial covariates for image reconstruction. In addition, we present a least-squares connection to the maximum likelihood solution under missing data and show its intuitive connection to the geometry of the subspace learning problem.
信息缺失或退化仍然是自动人脸表示和识别面临的重大实际挑战。一般来说,现有的方法要么寻求生成反转退化过程,要么寻求不受退化过程影响的歧视性表征。理想情况下,这个问题的解决方案存在于这两个透视图之间。为此,在本文中,我们展示了使用概率线性子空间模型(特别是变分概率PCA)对伪装或遮挡下的面部数据建模和识别的有效性。从判别的角度,我们在几个验证实验中验证了该方法对衰减由于伪装和非线性镜面导致的丢失数据的影响的有效性。从生成的角度来看,我们证明了它不仅在估计缺失信息方面有用,而且在理解图像重建的面部协变量方面有用。此外,我们给出了缺失数据下最大似然解的最小二乘连接,并显示了它与子空间学习问题几何的直观连接。
{"title":"Face recognition despite missing information","authors":"Charlie K. Dagli, K. Brady, Daniel C. Halbert","doi":"10.1109/THS.2011.6107915","DOIUrl":"https://doi.org/10.1109/THS.2011.6107915","url":null,"abstract":"Missing or degraded information continues to be a significant practical challenge facing automatic face representation and recognition. Generally, existing approaches seek either to generatively invert the degradation process or find discriminative representations that are immune to it. Ideally, the solution to this problem exists between these two perspectives. To this end, in this paper we show the efficacy of using probabilistic linear subspace models (in particular variational probabilistic PCA) for both modeling and recognizing facial data under disguise or occlusion. From a discriminative perspective, we verify the efficacy of this approach for attenuating the effect of missing data due to disguise and non-linear speculars in several verification experiments. From a generative view, we show its usefulness in not only estimating missing information, but also understanding facial covariates for image reconstruction. In addition, we present a least-squares connection to the maximum likelihood solution under missing data and show its intuitive connection to the geometry of the subspace learning problem.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114381903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2011 IEEE International Conference on Technologies for Homeland Security (HST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1