MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)最新文献

筛选
英文 中文
Online detection and control of malware infected assets 在线检测和控制被恶意软件感染的资产
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170869
H. Çam
{"title":"Online detection and control of malware infected assets","authors":"H. Çam","doi":"10.1109/MILCOM.2017.8170869","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170869","url":null,"abstract":"Malware infection activities need to be detected as early as possible to minimize the adverse impact of malware delivery, infection, exploitation, and spreading. Given that cybersecurity observations over a network are usually incomplete, noisy, uncertain, and need to be extracted from a big data size, it is a challenge to extract quality information for identifying vulnerable, infected, or exploited assets and then taking appropriate actions to mitigate the impact of malware infection and spread. This paper presents an integrated model of logistic regression and Partially Observable Markov Decision Process (POMDP) along with online data analytics on temporal causality and dependency relationships of observations. New regression and malware infection features are developed by capturing and formulating the cross relationships of observations. Logistic regression of these new features is used to estimate the initial probability values that sensor measurements are indicative of vulnerability exploitations, which help infer the infection status of those assets associated with the vulnerabilities to be likely exploited. The results of the logistic regression on the infection status of assets are considered as the initial belief state of POMDP. The integrated model of logistic regression and POMDP is designed to iteratively collaborate in identifying and controlling malware infection and spread. Experimental results show the efficiency of having such collaboration in identifying and controlling malware-infected assets.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125942345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Maximizing interconnectedness and availability in directional airborne range extension networks 最大化定向机载范围扩展网络的互联性和可用性
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170726
T. Shake, R. Amin
{"title":"Maximizing interconnectedness and availability in directional airborne range extension networks","authors":"T. Shake, R. Amin","doi":"10.1109/MILCOM.2017.8170726","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170726","url":null,"abstract":"Range extension via the use of small aircraft with highly directional antennas that act as relays is a topic of interest in military network technology development. Antenna elements in such designs typically have limited field-of-view (FoV), potentially making interconnectedness among communication nodes dependent on the geometry of the physical network. This paper examines a generic sectorized pod antenna design and compares the interconnectedness and link availability of these designs in representative range extension network layouts. A heuristic for determining quantitative trade-offs between link availability and node interconnectedness is developed. Results from this heuristic show that both interconnectedness and availability increase with a decreasing number of antenna sectors, and that a marginal azimuthal overlap increases average link availability substantially in two representative scenarios.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116905750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance of selection DF scheme for a relay system with non-identical Rician fading 非同时延中继系统选择DF格式的性能
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170725
Xian Liu
{"title":"Performance of selection DF scheme for a relay system with non-identical Rician fading","authors":"Xian Liu","doi":"10.1109/MILCOM.2017.8170725","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170725","url":null,"abstract":"In this paper, we investigate the performance of a generic relay system for small cells. The main features include the selection decode-and-forward (DF) scheme, Rician and Rayleigh fading, single or repeated transmissions in direct link, and maximal-ratio combining at destination. We are able to derive a set of closed-form expressions for the end-to-end performance. Based on these formulas, we define a metric, called the differential outage probability (DOP), to characterize the differential performance due to repetition coding. It is shown that the benefit of repetition diminishes quickly when the components of line-of-sight (LOS) increase.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114276194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A new UHF narrowband satellite communications PHY layer for HPW 一种用于HPW的超高频窄带卫星通信物理层
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170730
J. Norris, J. Nieto
{"title":"A new UHF narrowband satellite communications PHY layer for HPW","authors":"J. Norris, J. Nieto","doi":"10.1109/MILCOM.2017.8170730","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170730","url":null,"abstract":"The High Performance Waveform (HPW) was developed before parallel concatenated codes (PCCC) and serial concatenated codes (SCCC) were in wide use and so it makes sense to take advantage of the advancements in communication theory and processor computation speed that have taken place since its inception. In its current form, HPW transmits a Raised-Cosine Continuous Phase Modulation (1RC CPM) modulation with a trellis code that is designed to provide, with the use of a Cyclic Redundancy Check Code error detection (CRC), error free transmission over a single, narrowband UHF satellite communications channel. In this paper we present an additional set of coding and modulation schemes which take advantage of serial concatenated code (SCCC) technology to simultaneously improve throughput at the lower end of the signal-to-noise ratio (SNR) range while increasing the highest throughput at the highest SNR available on UHF satellites. The overall bit error rate and throughput of each individual modulation type is analyzed and the framework for the adaptive modulation protocol is provided. To provide for a gradual release of a newer revision of HPW, a framework for a PHY layer is provided which will allow a heterogeneous network of legacy and updated radio terminals.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114402299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Statistical quality of service provisioning over edge computing mobile wireless networks 在边缘计算移动无线网络上提供服务的统计质量
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170781
Xi Zhang, Qixuan Zhu
{"title":"Statistical quality of service provisioning over edge computing mobile wireless networks","authors":"Xi Zhang, Qixuan Zhu","doi":"10.1109/MILCOM.2017.8170781","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170781","url":null,"abstract":"The edge computing techniques have been developed to support the exponentially increasing service demands in the fifth generation (5G) networks by bringing the data contents and their corresponding computations/communications near to mobile users. As a promising and efficient solution to implement edge computing techniques, mobile data offloading complements the traditional cellular transmission through either WiFi networks or device-to-device (D2D) communication/relay to mitigate the overloaded wireless traffics for cellular networks. However, the mobile data offloading in edge computing wireless networks imposes many new quality of service (QoS) guarantee problems which still remain opening research areas. To overcome these challenges, in this paper we propose the statistical delay-bounded QoS provisioning schemes using the effective capacity theory for two types of mobile data offloading: WiFi offloading and D2D offloading, where we formulate the WiFi offloading and D2D offloading as the single-hop and two-hop wireless-link statistical QoS provisioning problems, respectively. We also derive the optimal probability of using each type of offloading which maximizes the average effective capacity for all mobile users under the following two scenarios: (1) all mobile users have the same probability of requesting the popular multimedia data contents and have the same probability to become a relay in D2D offloading; and (2) each mobile user has the distinct probability of requesting the popular multimedia data contents and the distinct probability to become a relay in D2D offloading. Finally, we evaluate and validate our proposed statistical delay-bounded QoS provisioning schemes over multimedia data offloading architecture through numerical analyses.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131049495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Outage probability analysis of the Protected Tactical Waveform (PTW) on the return link 返回链路上保护战术波形(PTW)的中断概率分析
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170771
L. Nguyen, R. Wells, D. Nguyen, N. Tran
{"title":"Outage probability analysis of the Protected Tactical Waveform (PTW) on the return link","authors":"L. Nguyen, R. Wells, D. Nguyen, N. Tran","doi":"10.1109/MILCOM.2017.8170771","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170771","url":null,"abstract":"This paper analyzes the outage probability of a multicarrier signal, using the Protected Tactical Waveform (PTW) on the return link (RL). The signal is relayed over a nonlinear distorted satellite transponder. The transponder is modelled to include a gain element, a soft limiter, and a travelling wave tube amplifier (TWTA); a Shaleh model is used to model the TWTA. The outage probability is determined when the probability of the mutual information random variable is less than the code rate. The outage probability is used as a theoretical bound for maximum capacity. This bound serves as an important benchmark of the achievable rate for the RL. The degree in which M-ary phased shift keying (MPSK) signals using Digital Video Broadcasting — Satellite — Second generation (DVB-S2) forward error correction (FEC) with numerous code rates to achieve this bound is investigated by computer simulation, and also discussed in the paper.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126918913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy preserving localization using a distributed particle filtering protocol 使用分布式粒子过滤协议的隐私保护定位
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170863
Tyler Ward, Joseph I. Choi, Kevin R. B. Butler, J. Shea, Patrick Traynor, T. Wong
{"title":"Privacy preserving localization using a distributed particle filtering protocol","authors":"Tyler Ward, Joseph I. Choi, Kevin R. B. Butler, J. Shea, Patrick Traynor, T. Wong","doi":"10.1109/MILCOM.2017.8170863","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170863","url":null,"abstract":"Cooperative spectrum sensing is often necessary in cognitive radios systems to localize a transmitter by fusing the measurements from multiple sensing radios. However, revealing spectrum sensing information also generally leaks information about the location of the radio that made those measurements. We propose a protocol for performing cooperative spectrum sensing while preserving the privacy of the sensing radios. In this protocol, radios fuse sensing information through a distributed particle filter based on a tree structure. All sensing information is encrypted using public-key cryptography, and one of the radios serves as an anonymizer, whose role is to break the connection between the sensing radios and the public keys they use. We consider a semi-honest (honest-but-curious) adversary model in which there is at most a single adversary that is internal to the sensing network and complies with the specified protocol but wishes to determine information about the other participants. Under this scenario, an adversary may learn the sensing information of some of the radios, but it does not have any way to tie that information to a particular radio's identity. We test the performance of our proposed distributed, tree-based particle filter using physical measurements of FM broadcast stations.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129080301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
3-Way game model for privacy-preserving cybersecurity information exchange framework 保密性网络安全信息交换框架的三向博弈模型
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170842
Iman Vakilinia, Deepak K. Tosh, S. Sengupta
{"title":"3-Way game model for privacy-preserving cybersecurity information exchange framework","authors":"Iman Vakilinia, Deepak K. Tosh, S. Sengupta","doi":"10.1109/MILCOM.2017.8170842","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170842","url":null,"abstract":"With the growing number of cyberattack incidents, organizations are required to have proactive knowledge on the cybersecurity landscape for efficiently defending their resources. To achieve this, organizations must develop the culture of sharing their threat information with others for effectively assessing the associated risks. However, sharing cybersecurity information is costly for the organizations due to the fact that the information conveys sensitive and private data. Hence, making the decision for sharing information is a challenging task and requires to resolve the trade-off between sharing advantages and privacy exposure. On the other hand, cybersecurity information exchange (CYBEX) management is crucial in stabilizing the system through setting the correct values for participation fees and sharing incentives. In this work, we model the interaction of organizations, CYBEX, and attackers involved in a sharing system using dynamic game. With devising appropriate payoff models for each player, we analyze the best strategies of the entities by incorporating the organizations' privacy component in the sharing model. Using the best response analysis, the simulation results demonstrate the efficiency of our proposed framework.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130972571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Cyber situational awareness enhancement with regular expressions and an evaluation methodology 使用正则表达式和评估方法增强网络态势感知
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170859
Hyun Kyoo Park, Min Sik Kim, Moosung Park, Kyungho Lee
{"title":"Cyber situational awareness enhancement with regular expressions and an evaluation methodology","authors":"Hyun Kyoo Park, Min Sik Kim, Moosung Park, Kyungho Lee","doi":"10.1109/MILCOM.2017.8170859","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170859","url":null,"abstract":"Cybersecurity is one of critical issues in modern military operations. In cyber operations, security professionals depend on various information and security systems to mitigate cyber threats through enhanced cyber situational awareness. Cyber situational awareness can give decision makers mission completeness and providing appropriate timely decision support for proactive response. The crucial information for cyber situational awareness can be collected at network boundaries through deep packet inspection with security systems. Regular expression is regarded as a practical method for deep packet inspection that is considering a next generation intrusion detection and prevention, however, it is not commonly used by the reason of its resource intensive characteristics. In this paper, we describe our effort and achievement on regular expression processing capability in real time and an evaluation method with experimental result.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123623602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enabling real-time global reach using a gateway building framework 使用网关构建框架实现实时全球覆盖
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170750
Nathaniel B. Soule, Benjamin Toll, Colleen T. Rock, Emily H. Do, J. Price, J. Loyall, Joseph P. McEttrick, James R. Milligan
{"title":"Enabling real-time global reach using a gateway building framework","authors":"Nathaniel B. Soule, Benjamin Toll, Colleen T. Rock, Emily H. Do, J. Price, J. Loyall, Joseph P. McEttrick, James R. Milligan","doi":"10.1109/MILCOM.2017.8170750","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170750","url":null,"abstract":"The enterprise and tactical domains have distinct properties and requirements, and have thus evolved independently in incompatible ways. Today the network infrastructure has emerged to, in theory, enable interconnectivity between these domains at a global scale. Unfortunately, even in the presence of these communication capabilities and despite the benefits that each operational domain can gain from access to information held by the other, warfighters at the tactical edge and analysts in enterprise agencies continue to lack meaningful, realtime access to each other's information. The separate evolution of the two domains has led to clients that use different forms of identification and access control, systems that employ different applications and use different data formats, and networks that operate most efficiently under different protocols. To address these differences and the need to meaningfully bridge enterprise and tactical domains, we are developing a framework for Robust Operational Gateways Enabling Reachback/Reach-forward (ROGER). ROGER attempts to address the hard problems inherent in connecting disparate clients, services, and networks over potentially unreliable communication substrates, in a manner that not only enables connectivity where none was present before, but in a way that enables efficient, effective, safe, and reliable information discovery and sharing. Acknowledging the plurality of types and structures of networks, services, applications, and missions, ROGER provides a gateway framework rather than a specific gateway. This framework supports building gateways that enable safe reach-back and reach-forward across a large set of heterogeneous networks and systems. By enabling the selection and configuration of pluggable, context specific components, ROGER supports the instantiation of gateways customized for particular deployments. Multiple gateways can be chained to provide reach-back and reach-forward across widely different and geographically dispersed networks.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127308153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信