MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)最新文献

筛选
英文 中文
Model-Guided Infection Prediction and Active Defense Using Context-Specific Cybersecurity Observations 基于特定情境的网络安全观察的模型引导感染预测和主动防御
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020980
H. Çam
{"title":"Model-Guided Infection Prediction and Active Defense Using Context-Specific Cybersecurity Observations","authors":"H. Çam","doi":"10.1109/MILCOM47813.2019.9020980","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020980","url":null,"abstract":"Cybersecurity tools such as intrusion detection and prevention systems usually generate far too many alerts, indicators or log data, many of which do not have obvious security implications unless their correlations and temporal causality relationships are determined. In order to infer cybersecurity observations and take defensive actions for a given set of assets, this paper proposes methods to first estimate the infected and exploited assets and then take recovery and preventive actions, with the help of graphs, deep learning, and autonomous agents. The proposed motif and graph thinking analysis of cyber infection and exploitation predicts the infection states of some assets. This prediction data of infections is taken as input data by deep learning networks to enable the agents to determine effective actions for inferring adversary activities and protecting assets. The results of the infection prediction and the games of these agents show the effectiveness of actions.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"28 19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127232672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automating Distributed Firewalls: A Case for Software Defined Tactical Networks 自动化分布式防火墙:软件定义战术网络的一个案例
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9021061
Brent E. Logan, G. Xie
{"title":"Automating Distributed Firewalls: A Case for Software Defined Tactical Networks","authors":"Brent E. Logan, G. Xie","doi":"10.1109/MILCOM47813.2019.9021061","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9021061","url":null,"abstract":"We make a case for more rapid adoption of software defined network (SDN) technology in the DoD by demonstrating that distributed firewall operation can be virtualized, automated, and assured of security properties with SDN. Specifically, we have developed and evaluated a distributed firewall application within the standard ONOS SDN control platform. The application enforces access control between arbitrary end points and intelligently distributes processing of filter rules across network devices, even after the network topology changes. The testbed evaluation results confirm the reachability control performance and show that the application and virtual switches built upon commodity computers are capable of handling more than 50,000 filter rules.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132411283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
VulnerVAN: A Vulnerable Network Generation Tool vulnerability:一个易受攻击的网络生成工具
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9021013
S. Venkatesan, E. A. Newcomb, Blaine Hoffman, Norbou Buchler, Jason A. Youzwak, Shridatt Sugrim, C. Chiang, A. Poylisher, Matthew Witkowski, Gary Walther, Michelle Wolberg, R. Chadha
{"title":"VulnerVAN: A Vulnerable Network Generation Tool","authors":"S. Venkatesan, E. A. Newcomb, Blaine Hoffman, Norbou Buchler, Jason A. Youzwak, Shridatt Sugrim, C. Chiang, A. Poylisher, Matthew Witkowski, Gary Walther, Michelle Wolberg, R. Chadha","doi":"10.1109/MILCOM47813.2019.9021013","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9021013","url":null,"abstract":"Cyber training, security testing, and research and development activities are vital to improve the security posture of a network. Currently, many institutions use cyber security testbeds to conduct these activities in an isolated virtual environment. One of the important requirements for such an environment is to provide organizers (or experimenters) with a library of vulnerable network scenarios and capabilities to mount attacks against them. However, the task of preparing a vulnerable network scenario in current testbed environments is costly in time and labor, requires significant support from the testbed staff. To this end, we present a toolset called VulnerVAN that creates a vulnerable network scenario to realize an attack sequence. In this paper, we discuss the design of VulnerVAn - our proof-of-concept implementation on CyberVAN - and present a new high-level attack specification language that enables users to chain attack steps into an attack sequence. For a given attack sequence and network scenario, VulnerVAN identifies all possible attack paths through the network that can realize the attack sequence, and provides instructions to configure machines on an attack path selected by the user. VulnerVAn also provides an attack blueprint that can guide a Red team or an automated attacker to execute the attack sequence. To demonstrate VulnerVAN's capability, we consider the use-case of a typical data exfiltration attack sequence conducted by APTs and study the performance of VulnerVAn in mapping the attack sequence to different networks.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131809041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Achievable Information-Theoretic Secrecy in the Presence of a Radar 雷达存在下可实现的信息论保密
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020731
Bo Guan, D. Goeckel
{"title":"Achievable Information-Theoretic Secrecy in the Presence of a Radar","authors":"Bo Guan, D. Goeckel","doi":"10.1109/MILCOM47813.2019.9020731","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020731","url":null,"abstract":"As the demand for spectrum increases, co-existence between radar and communication systems has been of increased interest. However, the effect of a radar signal on the secrecy capacity of a communication system operating in the environment has not been addressed. Particularly, for military operations, the limited dynamic range of real receivers is important to consider because the radar signal is often large enough to send the receivers into nonlinearity. In this paper, information-theoretic secrecy is considered when a friendly radar is present in the wiretap channel: the intended receiver Bob can cancel the radar signal before recording the signal based on a key sequence which is shared by the radar with the transmitter Alice and with Bob. However, due to the non-linear conversion operation in the eavesdropper Eve's receiver, Eve is inhibited from recovering the transmitted signal even if she obtains the key after storing the received signal. We analyze the information-theoretic secrecy rate of a wiretap channel co-existing with the radar signal without Gaussian assumptions on the radar signal. This analysis is made difficult relative to prior work due to the complex structure of the radar signal and the correlation between the two dimensions. We show that a positive secrecy rate can be achieved, even when the eavesdropper is closer to the transmitter than the intended receiver.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127712067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Communications Aware Adversarial Residual Networks for over the Air Evasion Attacks 空中规避攻击的通信感知对抗性残余网络
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020716
Bryse Flowers, R. Buehrer, W. Headley
{"title":"Communications Aware Adversarial Residual Networks for over the Air Evasion Attacks","authors":"Bryse Flowers, R. Buehrer, W. Headley","doi":"10.1109/MILCOM47813.2019.9020716","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020716","url":null,"abstract":"Recent work in adversarial radio frequency machine learning has demonstrated the use of untargeted adversarial machine learning techniques for over the air evasion of raw inphase and quadrature based Automatic Modulation Classification Deep Neural Networks. However, most of the proposed methodologies only consider the effect of adversarial machine learning on the underlying transmission as an evaluation metric or don't consider it at all. Furthermore, all of the proposed techniques require gradient computation for each example in order to craft an adversarial perturbation, which makes deployment of these adversarial methodologies to communications hardware difficult. The current work addresses both of these shortcomings. First, methodology is developed that directly accounts for the bit error rate of the underlying transmission in the adversarial optimization problem. Additionally, the learned model for perturbation creation is encapsulated in a fully convolutional adversarial residual network. Once the parameters of this network are learned, it can be easily deployed. The methodology is found to perform equivalently or better than a comparison adversarial evasion attack using the well known Fast Gradient Sign Method.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129211240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Robust MIMO Communications Against Antenna Blockage and Interference 抗天线阻塞和干扰的鲁棒MIMO通信
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020916
Yang Liu, Biao Chen, Janek J. Mroczek, J. Malowicki, R. Michalak
{"title":"Robust MIMO Communications Against Antenna Blockage and Interference","authors":"Yang Liu, Biao Chen, Janek J. Mroczek, J. Malowicki, R. Michalak","doi":"10.1109/MILCOM47813.2019.9020916","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020916","url":null,"abstract":"Airborne platforms, either piloted or unmanned, are an integral part of most situational awareness systems. An imperative to the success of such situational awareness systems is the ability to reliably deliver high throughput low latency data from these airborne platforms. This paper presents a promising airborne multiple-input multiple-output (MIMO) communication system for the intended situation awareness applications. The proposed system addresses three major challenges in airborne MIMO communications: 1) antenna blockage due largely to the movement and orientation of the airborne platforms; 2) the presence of unknown interference inherent to the intended application; 3) the lack of channel state information (CSI) at the transmitter. Built on the Diagonal Bell-Labs Layered Space-Time (D-BLAST) MIMO architecture, the system integrates three key design approaches: spatial spreading to counter antenna blockage; temporal spreading to mitigate signal to interference and noise ratio degradation due to interference; and a simple low rate feedback scheme to enable adaptivity in the absence of full transmitter CSI. A fully functioning experimental 4 ⨯ 4 MIMO system is built using USRP software radio systems. Extensive studies using the developed system validate the performance advantage over the conventional D-BLAST system in the presence of channel impairment due to antenna blockage and interference.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"28 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128668466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing IoT RF Fingerprinting Systems with Generative Adversarial Networks 利用生成对抗网络保护物联网射频指纹系统
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020907
Kevin Merchant, Bryan D. Nousain
{"title":"Securing IoT RF Fingerprinting Systems with Generative Adversarial Networks","authors":"Kevin Merchant, Bryan D. Nousain","doi":"10.1109/MILCOM47813.2019.9020907","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020907","url":null,"abstract":"Recently, a number of neural network approaches to physical-layer wireless security have been introduced. In particular, these approaches are able to authenticate the identity of different wireless transmitters by the device-specific imperfections present in their transmitted signals. In this paper, we introduce a weakness in the training protocol of these approaches, namely, that a generative adversarial network (GAN) can be trained to produce signals that are realistic enough to force classifier errors. We show that the GAN can learn to introduce signal imperfections without modifying the bandwidth or data contents of the signal, and demonstrate via experiment that classifiers trained only on transmissions from real devices are vulnerable to this sort of attack. Finally, we demonstrate that by augmenting the training dataset of the classifier with adversarial examples from a different GAN, we are able to strengthen the classifier against this vulnerability.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"393 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115311422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Identifying Bottleneck Nodes using Packet Delay Statistics 利用包延迟统计信息识别瓶颈节点
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9021045
Joshua Marker, J. Shea, T. Wong, Eric Graves, Paul L. Yu
{"title":"Identifying Bottleneck Nodes using Packet Delay Statistics","authors":"Joshua Marker, J. Shea, T. Wong, Eric Graves, Paul L. Yu","doi":"10.1109/MILCOM47813.2019.9021045","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9021045","url":null,"abstract":"An algorithm to identify the bottleneck nodes linking two component networks in a simple network of networks (NoN) configuration is proposed. The proposed bottleneck identification algorithm is based on applying a support vector machine on clustered packet delay measurements. This algorithm has the advantage that it requires almost no information about the topology of the underlying NoN. Simulation results show that this algorithm can provide very good detection performance when the component networks of the NoN are not too small in size, or when the connectivity between nodes within the component networks is not too sparse.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116173380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stochastic Packet Forwarding Algorithm in Flying Ad Hoc Networks 飞行Ad Hoc网络中的随机分组转发算法
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020723
Cong Pu
{"title":"Stochastic Packet Forwarding Algorithm in Flying Ad Hoc Networks","authors":"Cong Pu","doi":"10.1109/MILCOM47813.2019.9020723","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020723","url":null,"abstract":"The drones, also officially referred to as unmanned airborne vehicles (UAVs), have captured the attention of hobbyists, researchers, and investors, and are becoming increasingly popular for various commercial, industrial, and public-safety applications. As an essential ingredient of Internet-of-Drones, Flying Ad Hoc Networks (FANETs) largely consisting of various drones are expeditiously proliferating and playing an important role in realizing the goal of coordinating the access of drones to controlled airspace and providing navigation services. However, packet forwarding in FANETs is challenged by the unique characteristics of FANETs, such as unstable wireless medium and intermittent connectivity caused by high mobility of drones. In this paper, we propose a stochastic packet forwarding algorithm, also called SPA, to provide efficient and reliable data transmission in FANETs. The basic idea of the SPA is to make a stochastic forwarding drone selection based on the combination of multiple real-time network metrics. By objectively allocating the weight to multiple real-time network metrics based on the entropy weight theory, the SPA computes the forwarding availability of each forwarding candidate drone. Then, the forwarding probability of each forwarding candidate drone is calculated, and the forwarding drone is stochastically chosen from all forwarding candidate drones based on the calculated forwarding probability. In experimental performance evaluation, we select link throughput and link expiration time as real-time network metrics, and evaluate the proposed stochastic packet forwarding algorithm through extensive simulation experiments using OMNeT++ and compare its performance with a prior motion-driven packet forwarding algorithm. Simulation results show that the SPA can improve the number of delivered packets as well as the average throughput, indicating a viable approach in FANETs.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114876493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Stacked Predictor and Dynamic Thresholding Algorithm for Anomaly Detection in Spacecraft 航天器异常检测的堆叠预测和动态阈值算法
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9021055
Tianyu Li, M. Comer, E. Delp, Sundip R. Desai, James L. Mathieson, Richard H. Foster, Moses W. Chan
{"title":"A Stacked Predictor and Dynamic Thresholding Algorithm for Anomaly Detection in Spacecraft","authors":"Tianyu Li, M. Comer, E. Delp, Sundip R. Desai, James L. Mathieson, Richard H. Foster, Moses W. Chan","doi":"10.1109/MILCOM47813.2019.9021055","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9021055","url":null,"abstract":"Anomaly or abnormal behavior detection in downlinked spacecraft telemetry is a key step for determining root cause of subsystem failures. Long Short-Term Memory networks (LSTMs) have been demonstrated to be useful for anomaly detection in time series, due to their predictive power, especially with long sequences that contain contextual information. However, there could be thousands of telemetry channels transmitted from the spacecraft with diverse signal characteristics. A single LSTM predictor may not perform well for all data channels. To enhance adaptability, we propose a stacked predictor framework. This framework stacks three LSTM based predictors with different neuron arrangements and a Support Vector Machine (SVM) based predictor in its first layer. A traditional fully connected layer is used as its second layer. We then estimate the distribution of the error of the predicted output using Kernel Density Estimation (KDE). Finally, a novel dynamic thresholding algorithm is applied to optimally extract anomalous behavior in the data. We present the Stacked Predictor results against the benchmark from the NASA MSL/SMAP anomaly dataset.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126800123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信