2021 International Conference on Military Communication and Information Systems (ICMCIS)最新文献

筛选
英文 中文
Mobile cyber defense agents for low throughput DNS-based data exfiltration detection in military networks 军用网络低吞吐量基于dns的数据泄露检测移动网络防御代理
2021 International Conference on Military Communication and Information Systems (ICMCIS) Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486400
T. Aurisch, Paula Caballero Chacón, Andreas Jacke
{"title":"Mobile cyber defense agents for low throughput DNS-based data exfiltration detection in military networks","authors":"T. Aurisch, Paula Caballero Chacón, Andreas Jacke","doi":"10.1109/ICMCIS52405.2021.9486400","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486400","url":null,"abstract":"DNS is a widely adopted protocol for the translation between domain names and IP addresses. Due to its lack of built-in security mechanisms attackers often use DNS for attacks like tunneling and data exfiltration. Solutions for centralized and static networks exist but fail to work efficiently in tactical networks. In this paper, we combine the concept of mobile agents with modern analysis techniques like machine learning to develop a detection system for DNS-based attacks in military networks. The proposed system is evaluated regarding its efficiency.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115268713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
5G for deployable and maritime communications 5G用于可部署和海上通信
2021 International Conference on Military Communication and Information Systems (ICMCIS) Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486397
G. Capela, Warren Low, Luis Bastos
{"title":"5G for deployable and maritime communications","authors":"G. Capela, Warren Low, Luis Bastos","doi":"10.1109/ICMCIS52405.2021.9486397","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486397","url":null,"abstract":"Mission networks in support of NATO expeditionary and maritime operations demand high capacity and reliable, yet easy to deploy and operate, communication solutions. Emerging 5G technologies towards IMT–2020 vision are poised to push the technology limits and enable new applications in many industry verticals and the military is no exception. ACT and NCI Agency have been investigating the potential of 5G technologies for military applications and have identified a number of scenarios where 5G technologies could bring an advantage to the warfighter. This paper describes in detail prominent deployable headquarter and maritime scenarios – its operational context and unique challenges –, where existing or close-to-market 5G technologies could be utilized and be advantageous. It then proposes a way forward for an experimental proof of concept to assert technology readiness, adequacy of the envisaged implementation concept and identification of associated challenges. The outcomes of the experimental proof of concept and subsequent analyses are expected to inform NATO decision makers on both the potential and limitations of 5G technologies, whether NATO and nations decide or not to adopt it to the existing toolset of wireless technologies.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130605464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Status Update on Quantum Safe Cryptography 量子安全密码学研究进展
2021 International Conference on Military Communication and Information Systems (ICMCIS) Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486413
Martin Strand
{"title":"A Status Update on Quantum Safe Cryptography","authors":"Martin Strand","doi":"10.1109/ICMCIS52405.2021.9486413","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486413","url":null,"abstract":"There is an ongoing effort to standardize asymmetric cryptography that should not be attackable by a quantum computer. The process is now into its final rounds. From 69 initial submissions from academia and industry, a small number of standardized schemes are expected in 2022–2024. The standards coming out from this work are expected to be used to secure civilian and military networks alike in the future, superseding current asymmetric techniques. In addition to providing an introduction to the process to this community, we also report on our own experiments with these schemes, highlighting which trade-offs one could prepare for.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130155463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Multimodal Mixed Reality Data Exploration Framework for Tactical Decision Making 面向战术决策的多模态混合现实数据探索框架
2021 International Conference on Military Communication and Information Systems (ICMCIS) Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486422
Tim Mittermeier, Matthias T. Frank, Sabine Ullrich, G. Rodosek, Michaela Geierhos
{"title":"A Multimodal Mixed Reality Data Exploration Framework for Tactical Decision Making","authors":"Tim Mittermeier, Matthias T. Frank, Sabine Ullrich, G. Rodosek, Michaela Geierhos","doi":"10.1109/ICMCIS52405.2021.9486422","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486422","url":null,"abstract":"In a data-driven, open-source information space, automatization tools and techniques are indispensable for analyzing the large amount of data and gaining knowledge from it. Often however, methods focus solely on the data acquisition methods without providing an appropriate visualization and interactive exploration tool or framework that presents the information directly to the user in a descriptive manner. Especially in crisis areas, where it is crucial to keep communication chains short and simple, mixed reality methods can help to present and explore important and relevant records that directly add value to the user in near real-time.This paper presents a novel approach towards data exploration in mixed reality environments, with the aim to enhance tactical decision-making processes and shorten unnecessarily long communication chains.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115036811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Bottleneck Message Passing for Military Applications 军事应用中的信息瓶颈消息传递
2021 International Conference on Military Communication and Information Systems (ICMCIS) Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486405
J. Lewandowsky, M. Adrat, G. Bauch
{"title":"Information Bottleneck Message Passing for Military Applications","authors":"J. Lewandowsky, M. Adrat, G. Bauch","doi":"10.1109/ICMCIS52405.2021.9486405","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486405","url":null,"abstract":"Military communication systems naturally have strong requirements concerning the reliability and the robustness of their physical layer data transmission schemes. Modern channel coding and modulation schemes can meet these requirements in general, but their detection and decoding at the receiving end requires complex and power demanding high-precision implementations of digital algorithms, which are often not suitable for military applications. This motivates to explore novel techniques to build simple detection and decoding algorithms with good performance. In this article, we present novel results on the recent idea of using a machine learning framework termed the Information Bottleneck method to replace demanding implementations of the sum-product algorithm with very simple quantized message passing schemes. We provide a novel explanation, which links the Information Bottleneck decoder processing to the sum-product algorithm. Moreover, we present a novel Information Bottleneck demodulation scheme for quadrature amplitude modulation and discuss special advantages of the Information Bottleneck system design approach for military applications.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"19 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125772093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Multi-Parameter based Rate-Matching of Polar Codes 一种新的基于多参数的极化码速率匹配方法
2021 International Conference on Military Communication and Information Systems (ICMCIS) Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486401
Souradip Saha, M. Adrat
{"title":"Novel Multi-Parameter based Rate-Matching of Polar Codes","authors":"Souradip Saha, M. Adrat","doi":"10.1109/ICMCIS52405.2021.9486401","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486401","url":null,"abstract":"Polar codes have garnered a lot of attention from the scientific community owing to their low-complexity implementation and provably capacity achieving capability. They have been proposed to be used in 5G networks. However, the conventional approach of channel polarization introduced by Arikan in [1], can be used to design only codewords of length N = 2n, which is a major limitation when codewords of length N ≠ 2n are required. To perform rate-matching for such codeword lengths, using non-2×2 circuit kernels or resizing techniques (upsizing or downsizing) are the solutions. As per the technical specifications of 3GPP 5G NR standardization document [2], a unique threshold coderate value is used to determine whether puncturing or shortening should be used for downsizing polar codes, which although being plausibly optimal for the system configurations in [2], might be sub-optimal over a wider range of design parameter settings. In this paper, we introduce a novel downsizing type-selection (DTS) parameter which takes into account codeword length, coderate, effect of polarization and number of downsized bits, to determine the preferable method for downsizing polar codes.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113937060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quantum Computing for Military Applications 量子计算的军事应用
2021 International Conference on Military Communication and Information Systems (ICMCIS) Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486419
N. Neumann, Maran P. P. van Heesch, F. Phillipson, Antoine A. P. Smallegange
{"title":"Quantum Computing for Military Applications","authors":"N. Neumann, Maran P. P. van Heesch, F. Phillipson, Antoine A. P. Smallegange","doi":"10.1109/ICMCIS52405.2021.9486419","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486419","url":null,"abstract":"Quantum computers have the potential to outshine classical alternatives in solving specific problems, under the assumption of mature enough hardware. A specific subset of these problems relate to military applications. In this paper we consider the state-of-the-art of quantum technologies and different applications of this technology. Additionally, four use-cases of quantum computing specific for military applications are presented. These use-cases are directly in line with the 2021 AI strategic agenda of the Netherlands Ministry of Defense.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122461493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tactical information aggregation 战术信息聚合
2021 International Conference on Military Communication and Information Systems (ICMCIS) Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486412
Sebastian Stucken, Fahrettin Gökgöz, Hans-Christian Schmitz
{"title":"Tactical information aggregation","authors":"Sebastian Stucken, Fahrettin Gökgöz, Hans-Christian Schmitz","doi":"10.1109/ICMCIS52405.2021.9486412","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486412","url":null,"abstract":"Aggregation of Battle Space Objects (BSO) results in their assignment to units of higher echelons – i.e., tanks are assigned to platoons, platoons to companies, and companies to battalions. Aggregation can lead to information enrichment. Let us assume that armoured platoons consist of three battle tanks each. If two tanks have been detected and can be assigned to the same platoon, then a further tank, which has not been detected yet, is to be expected within the same area. We can tentatively derive the information that the tank is present. Aggregation and enrichment are essential tasks for achieving situational awareness. We will describe a rule-based approach to the automatic aggregation of tactical information. As a proof of concept, the approach has been implemented within a Command & Control Information System (C2IS) demonstrator.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"61 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133613586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Preliminary results of OLSR based MANET routing algorithms: OLSRd2-Qx reinforcement learning agents and ODRb 基于OLSR的MANET路由算法的初步结果:OLSRd2-Qx强化学习代理和ODRb
2021 International Conference on Military Communication and Information Systems (ICMCIS) Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486409
Y. Maret, J. Wagen, M. Raza, Junyuan Wang, N. Bessis, F. Legendre
{"title":"Preliminary results of OLSR based MANET routing algorithms: OLSRd2-Qx reinforcement learning agents and ODRb","authors":"Y. Maret, J. Wagen, M. Raza, Junyuan Wang, N. Bessis, F. Legendre","doi":"10.1109/ICMCIS52405.2021.9486409","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486409","url":null,"abstract":"In MANETs, congestion typically occurs on the interconnecting nodes between two or more groups of nodes. Routing to avoid the congested nodes via alternate, perhaps longer paths, allows more throughput, e.g., 50% more in the canonical 9-node 2-ring scenario. OLSR-Q is based on the routing protocol OLSR and a reinforcement learning (RL) agent to learn the most appropriate link states or \"Directional Air Time\" metric to avoid the congested nodes. The challenges for the RL agent are (1) to avoid congestion before packets are dropped and (2) to minimize the number of real valued or discrete observations or states. In this paper, three simplified OLSRd2-Qx versions are presented and compared to OLSRd2 and a centralized ODRb, Omniscient Dijkstra Routing-balanced, algorithm. The proposed OLSRd2-Qload algorithm provides the expected 50% increase in throughput on the 9-node 2-ring scenario with a specific test traffic scenario. On the NATO IST-124 Anglova scenario, and using an acknowledged message application, the Q-learning agents remain to be improved. The superior results of the centralized load balancing approach taken in ODRb will be investigated to train multi-agents systems including OLSR-Q.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123251607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cyber Intrusion Detection using Natural Language Processing on Windows Event Logs 基于Windows事件日志的自然语言处理网络入侵检测
2021 International Conference on Military Communication and Information Systems (ICMCIS) Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486307
Kai Steverson, Caleb Carlin, Jonathan Mullin, Metin B. Ahiskali
{"title":"Cyber Intrusion Detection using Natural Language Processing on Windows Event Logs","authors":"Kai Steverson, Caleb Carlin, Jonathan Mullin, Metin B. Ahiskali","doi":"10.1109/ICMCIS52405.2021.9486307","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486307","url":null,"abstract":"This paper applies deep learning and natural language processing to Windows Event Logs for the purpose of detecting cyber attacks. Data is collected from an emulated network that models an enterprise network. The network experiences a cyber attack that uses a spear phishing email and the eternal blue exploit to spread botnet malware. A machine learning anomaly detection algorithm is constructed using the transformer model and self-supervised training. The model is able to detect both the compromised devices as well as attack timing with near perfect precision and recall. These results suggest that this approach could function as the detection portion of an autonomous end point defense system wherein each device is able to react independently to potential intrusions.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116453995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信