MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)最新文献

筛选
英文 中文
Cyber Vulnerability Implantation Revisited 重新审视网络漏洞植入
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM) Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652921
J. Sigholm, Emil Larsson
{"title":"Cyber Vulnerability Implantation Revisited","authors":"J. Sigholm, Emil Larsson","doi":"10.1109/MILCOM52596.2021.9652921","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652921","url":null,"abstract":"In this paper we revisit a study presented at MILCOM 2014. Our goal then was to determine the utility of implanting a vulnerability into a cybersecurity software protocol to an actor planning to execute an offensive cyber operation. Based on a case study describing the then recently discovered Heartbleed bug as an offensive cyber operation, a model was devised to estimate the adoption rate of an implanted flaw in OpenSSL. Using the adoption rate of the cryptographic protocol Transport Layer Security version 1.2 as a proxy, we predicted that the global adoption of the vulnerability of at least 50% would take approximately three years, while surpassing 75% adoption would take four years. Compared to subsequently collected real-world data, these forecasts turned out to be surprisingly accurate. An evaluation of our proposed model shows that it yields results with a root-mean-square error of only 1.2% over the forecasting period. Thus, it has a significant degree of predictive power. Although the model may not be generalizable to describe the adoption of any software protocol, the finding helps validate our previously drawn conclusion that exploiting implanted cyber vulnerabilities, in a scenario like the one presented, requires a planning horizon of multiple years. However, as society becomes further dependent on the cyber domain, the utility of intentional vulnerability implantation is likely an exercise in diminishing returns. For a defender, however, our model development process could be useful to forecast the time required for flawed protocols to be phased out.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124192484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Complementary Sequence Construction for Constant-Envelope OFDM Transmission Enabling Nonlinear Amplification and Clipping 支持非线性放大和裁剪的恒包络OFDM传输互补序列构建
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM) Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653128
Kyle Willstatter, M. Zoltowski
{"title":"Complementary Sequence Construction for Constant-Envelope OFDM Transmission Enabling Nonlinear Amplification and Clipping","authors":"Kyle Willstatter, M. Zoltowski","doi":"10.1109/MILCOM52596.2021.9653128","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653128","url":null,"abstract":"The high PAPR of OFDM transmission leads to power/cost inefficiencies in amplifier use and/or spectral noise from clipping effects. To avoid these issues, we propose transmitting a complementary sequence pair whose aperiodic autocorrelations sum to a delta function in such a way that the amplitude of the signal is constant. This enables the use of low-cost nonlinear amplifiers operating at full power. The sequence pair is constructed iteratively, by sequential encoding of information symbols onto the pair such that the sequences remain complementary. The structure of these sequences and the resulting constant-envelope signal are analyzed, leading to methods of symbol extraction and the results of a decoding error. Finally, we extend the discussion to two dimensional sequence pairs, for use in mmWave/MIMO systems where the inefficiencies of a high PAPR are even more acute.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125906007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems 网络入侵检测系统中机器学习模型的中毒攻击和数据消毒缓解
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM) Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652916
S. Venkatesan, Harshvardhan Digvijay Sikka, R. Izmailov, R. Chadha, Alina Oprea, Michael J. de Lucia
{"title":"Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems","authors":"S. Venkatesan, Harshvardhan Digvijay Sikka, R. Izmailov, R. Chadha, Alina Oprea, Michael J. de Lucia","doi":"10.1109/MILCOM52596.2021.9652916","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652916","url":null,"abstract":"Among many application domains of machine learning in real-world settings, cyber security can benefit from more automated techniques to combat sophisticated adversaries. Modern network intrusion detection systems leverage machine learning models on network logs to proactively detect cyber attacks. However, the risk of adversarial attacks against machine learning used in these cyber settings is not fully explored. In this paper, we investigate poisoning attacks at training time against machine learning models in constrained cyber environments such as network intrusion detection; we also explore mitigations of such attacks based on training data sanitization. We consider the setting of poisoning availability attacks, in which an attacker can insert a set of poisoned samples at training time with the goal of degrading the accuracy of the deployed model. We design a white-box, realizable poisoning attack that reduced the original model accuracy from 95% to less than 50 % by generating mislabeled samples in close vicinity of a selected subset of training points. We also propose a novel Nested Training method as a defense against these attacks. Our defense includes a diversified ensemble of classifiers, each trained on a different subset of the training set. We use the disagreement of the classifiers' predictions as a data sanitization method, and show that an ensemble of 10 SVM classifiers is resilient to a large fraction of poisoning samples, up to 30% of the training data.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129864840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Optimizing Flows in Changing Tree-based Sensor Networks 基于变化树的传感器网络流优化
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM) Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653006
Albert Williams, D. Towsley
{"title":"Optimizing Flows in Changing Tree-based Sensor Networks","authors":"Albert Williams, D. Towsley","doi":"10.1109/MILCOM52596.2021.9653006","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653006","url":null,"abstract":"Military sensor networks often operate in resource challenged environments. This poses the problem of how to allocate resources to sensors flow to accomplish a mission. In this paper we consider a set of sensors that communicate observations up a tree to a fusion center. The value of the mission is modeled by a separable increasing concave functions and we develop a low complexity one step algorithm that allocates link capacities to each sensor so as to maximize this function. By limiting ourselves to a tree topology, we derive several important benefits, including the ability to quickly adapt to changes in utility functions or topology, and in a straightforward way to run our algorithm in a parallel, distributed manner over the network with little communication overhead and no centralized planning.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125077026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Propagator Rooting Method Direction of Arrival Estimation Based on Real Data 基于实际数据的传播子生根法到达方向估计
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM) Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653081
N. Tayem, Ahmed A. Hussain, Vinay Reddy Veramareddy, A. Soliman, J. Alghazo
{"title":"Propagator Rooting Method Direction of Arrival Estimation Based on Real Data","authors":"N. Tayem, Ahmed A. Hussain, Vinay Reddy Veramareddy, A. Soliman, J. Alghazo","doi":"10.1109/MILCOM52596.2021.9653081","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653081","url":null,"abstract":"In this paper, we present a novel and computationally efficient DOA estimation method that works equally well for both non-coherent and coherent sources. This method is based on applying the propagator method as a linear operator to the covariance matrix of the received data taken from a single snapshot of signals impinging on a uniform linear array. A Toeplitz Hermitian data matrix is constructed and transformed to a real-valued data matrix which significantly reduces computational complexity. The propagator method obviates the need to use either eigenvalue decomposition or singular value decomposition in calculating the DOA. Finally, the Root-MUSIC method is employed in conjunction with proposed method to estimate the angles of arrivals from the received signal. Simulation results demonstrate the efficacy of the proposed method.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127298499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards a COTS-Enabled Federated Cloud Architecture for Adaptive C2 in Coalition Tactical Operations: A Performance Analysis of Kubernetes 在联盟战术作战中,面向自适应C2的支持cots的联邦云架构:Kubernetes的性能分析
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM) Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9653050
Mattia Fogli, Geert L. J. Pingen, Thomas Kudla, S. Webb, Niranjan Suri, H. Bastiaansen
{"title":"Towards a COTS-Enabled Federated Cloud Architecture for Adaptive C2 in Coalition Tactical Operations: A Performance Analysis of Kubernetes","authors":"Mattia Fogli, Geert L. J. Pingen, Thomas Kudla, S. Webb, Niranjan Suri, H. Bastiaansen","doi":"10.1109/MILCOM52596.2021.9653050","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9653050","url":null,"abstract":"Nowadays, ever-increasing processing and storage resources are available at all echelons, from operations centers to tactical units. However, tactical-edge communications still suffer from scarce network resources such as limited bandwidth, intermittent connectivity, and variable latency. In addition, modern military missions typically involve coalition operations, where heterogeneous mission partners (even belonging to different nations) cooperate in the field. As a result, the distribution of mission-critical information is more complicated than ever. On the one hand, the dynamic nature of the tactical environment frequently disrupts communications. On the other hand, individual resource-sharing policies prevent mission partners from taking full advantage of the available resources in situ. The NATO IST-168 RTG has been exploring commercial-off-the-shelf orchestration technologies for implementing a federated cloud architecture that enables adaptive information processing and dissemination while living within the constraints of the tactical domain. This paper is a follow-up study that assesses the behaviour of Kubernetes under the disadvantaged network conditions characterizing tactical edge networks.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122389480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Congestion Aware Intent-Based Routing using Graph Neural Networks for Improved Quality of Experience in Heterogeneous Networks 基于拥塞感知意图路由的图神经网络在异构网络中的应用
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM) Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652977
Suzanna Lamar, J. Gosselin, Ivan Caceres, Sarah Kapple, A. Jayasumana
{"title":"Congestion Aware Intent-Based Routing using Graph Neural Networks for Improved Quality of Experience in Heterogeneous Networks","authors":"Suzanna Lamar, J. Gosselin, Ivan Caceres, Sarah Kapple, A. Jayasumana","doi":"10.1109/MILCOM52596.2021.9652977","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652977","url":null,"abstract":"Making use of spectrally diverse communications links to re-route traffic in response to dynamic environments to manage network bottlenecks has become essential in order to guarantee message delivery across heterogeneous networks. We propose an innovative, proactive Congestion Aware Intent-Based Routing (CONAIR) architecture that can select among available communication link resources based on quality of service (QoS) metrics to support continuous information exchange between networked participants. The CONAIR architecture utilizes a Network Controller (NC) and artificial intelligence (AI) to re-route traffic based on traffic priority, fundamental to increasing end user quality of experience (QoE) and mission effectiveness. The CONAIR architecture provides network behavior prediction, and can mitigate congestion prior to its occurrence unlike traditional static routing techniques, e.g. Open Shortest Path First (OSPF), which are prone to congestion due to infrequent routing table updates. Modeling and simulation (M&S) was performed on a multi-hop network in order to characterize the resiliency and scalability benefits of CONAIR over OSPF routing-based frameworks. Results demonstrate that for varying traffic profiles, packet loss and end-to-end latency is minimized.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121115491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Direct-Sequence Spread Spectrum with Signal Space Diversity for High Resistance to Jamming 具有信号空间分集的直接序列扩频具有高抗干扰性
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM) Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652967
Tarak Arbi, B. Geller, O. Pasquero
{"title":"Direct-Sequence Spread Spectrum with Signal Space Diversity for High Resistance to Jamming","authors":"Tarak Arbi, B. Geller, O. Pasquero","doi":"10.1109/MILCOM52596.2021.9652967","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652967","url":null,"abstract":"Jamming attacks can severely limit wireless networks availability and can cause serious damage, in particular for tactical applications. Over the past decades, Direct-Sequence Spread Spectrum (DSSS) has been used to enhance resistance to jamming. In this paper, we first analyze the performance of the DSSS modulation in the presence of malicious jamming; we take into account by considering different physical phenomena such as a large Doppler shift and we use at the receiver side robust synchronization algorithms. We then propose to consider jointly rotated constellations and the DSSS technique in order to enhance robustness against jamming, while keeping reasonable complexity. Simulations results underline the good performance of our proposal as it shows a gain of several dBs compared to the DSSS technique with conventional constellations.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"334 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116529279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Massive MIMO: review and a case for the 12 GHz band 大规模MIMO:回顾和12ghz频段的案例
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM) Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652931
D. Erricolo, William P. Alberth
{"title":"Massive MIMO: review and a case for the 12 GHz band","authors":"D. Erricolo, William P. Alberth","doi":"10.1109/MILCOM52596.2021.9652931","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652931","url":null,"abstract":"A review of the evolution that led to massive MIMO system is provided. Implementation challenges are discussed and a justification for the use of the 12 GHz bandwidth is given.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126117971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solving the Cross Domain Problem with Functional Encryption 用功能加密解决跨域问题
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM) Pub Date : 2021-11-29 DOI: 10.1109/MILCOM52596.2021.9652958
A. Kaminsky, M. Kurdziel, Steven Farris, M. Lukowiak, S. Radziszowski
{"title":"Solving the Cross Domain Problem with Functional Encryption","authors":"A. Kaminsky, M. Kurdziel, Steven Farris, M. Lukowiak, S. Radziszowski","doi":"10.1109/MILCOM52596.2021.9652958","DOIUrl":"https://doi.org/10.1109/MILCOM52596.2021.9652958","url":null,"abstract":"A Cross Domain Problem (CDP) is the question of how to securely access and exchange information between the domains of varying security levels. A Cross Domain Solution (CDS) addresses the CDP by designing the framework and protocols for such access and transfers. Most existing CDS methods rely on policies and trusted parties to manage different security levels. A CDS that can function in the presence of untrusted parties is a challenge. Functional Encryption (FE) is an encryption scheme in which a secret key allows one to compute a specific function of plaintext from the ciphertext. FE is a generalization of identity-based and attribute-based encryption frameworks. General and simultaneously practical FE is an emerging area, and only special types of encryption schemes and functions are effectively handled within existing systems. We apply the concepts of FE to explore a new solution to the CDP, and we argue that our solution does not leak information, provided that widely accepted assumptions about standard digital signatures hold. We built a practical software case study application using a trusted Key Distribution Center (KDC), a standard symmetric key block cipher component (like the AES), and using the Elliptic Curve Digital Signature Algorithm (ECDSA). The experiments show that the computational overhead introduced to routing by our method is cost effective, where the additional cost is equivalent to just a few applications of standard digital signatures.","PeriodicalId":187645,"journal":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129167258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信