{"title":"Rumor Detection on Time-Series of Tweets via Deep Learning","authors":"C. M. M. Kotteti, Xishuang Dong, Lijun Qian","doi":"10.1109/MILCOM47813.2019.9020895","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020895","url":null,"abstract":"False information has become a weapon in cyber-warfare. How to detect false information effectively and efficiently on social media is a challenging problem. In this study, a novel method of rumor detection on Twitter tweets is proposed as a proof-of-concept for fast detection of false information on social media. Specifically, the proposed method will use the propagation pattern of the tweets to detect false information rather than the contents. As a result, the proposed method is very effective in reducing the dimensionality of the input feature set, and it requires much less computational time compared to content-based methods. Extensive experiments on PHEME dataset, a collection of Twitter rumors and non-rumors posted during five breaking news, have been performed to demonstrate the effectiveness of the proposed method. We also observe that deep learning models such as recurrent neural networks outperform classical machine learning models in terms of micro-F score.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129648665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. McAuley, Y. Gottlieb, L. Kant, John Lee, A. Poylisher
{"title":"P4-Based Hybrid Error Control Booster Providing New Design Tradeoffs in Wireless Networks","authors":"A. McAuley, Y. Gottlieb, L. Kant, John Lee, A. Poylisher","doi":"10.1109/MILCOM47813.2019.9020724","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020724","url":null,"abstract":"Modern, general purpose error control solutions at the link and transport layers provide strong error control, suitable for most applications in most environments. There are, however, known limitations when applied to wireless, mobile and hostile environments, resulting in high latency or low throughput. This paper describes an implementation of a Hybrid Error Control (HEC) Booster that can be dynamically deployed anywhere in the network to support robust communication and provide broad design tradeoffs selectivity per application. It uses the emerging P4 standard to provide very-low latency processing of data packets that require control headers. With long burst losses, testbed results show how a pair of HEC Boosters can support either: a) high reliability and low latency using proactive parity packets, or b) high reliability and high throughput using parsimonious ACKs and incremental parities.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130644620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Effective Load Balanced Controller Placement Approach in Software-Defined WANs","authors":"Ning Cai, Yanni Han, Y. Ben, W. An, Zhen Xu","doi":"10.1109/MILCOM47813.2019.9020804","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020804","url":null,"abstract":"Wide Area Networks (WANs) are widely used in various fields such as business, education, government and military. The traditional network management of WANs has been difficult to meet the requirements of network development. Software-Defined Networking (SDN), a new network architecture with the concept of the separation between control and forwarding and centralized management, provides a practical solution for the efficient management of WANs. A Software-Defined WAN (SD-WAN) is usually deployed with multiple controllers due to the requirements of delay, scalability and reliability. The controller placement is a significant issue in a SD-WAN. In the literature, many approaches focus on reducing the delay between switches and controllers. However, these approaches may lead to load imbalance among controllers, which would have a negative impact on the performance and reliability of the network. In this paper, we define the load balanced controller placement problem, whose objective is to reduce the average delay between switches and controllers while maintaining load balance among controllers. And we propose an effective controller placement approach based on topological potential and minimum-cost flow to solve this problem. Extensive simulations on various real WAN topologies verify that our controller placement approach can effectively reduce the delay between switches and controllers and maintain good load balance among controllers. Our approach can also reduce the number of required controllers to avoid overload.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133980741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Roberto Fronteddu, Daniel Duran, Adrien Moucheboeuf, Rita Lenzi, A. Morelli, Niranjan Suri
{"title":"Managing Video Streaming in Tactical Networks","authors":"Roberto Fronteddu, Daniel Duran, Adrien Moucheboeuf, Rita Lenzi, A. Morelli, Niranjan Suri","doi":"10.1109/MILCOM47813.2019.9020937","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020937","url":null,"abstract":"Tactical networks are by nature resource constrained and unable to handle the bandwidth intensive task of streaming video. Nevertheless, tactical users often desire video streaming as in some cases, it can significantly enhance Situation Awareness. Hence, solutions capable of managing and delivering video resources in degraded environments, especially while balancing out the bandwidth for delivering other critical information, are extremely valuable for tactical applications. In this paper we analyze challenges associated with streaming video in degraded networks and present NetCacher, a video streaming management system specifically designed to overcome these challenges. NetCacher is capable of real time adaptation, providing parallel streaming at different qualities, and caching and forwarding video resources to overcome limitations related to node mobility and network disconnection. This paper also presents an experiment conducted in a simulated environment, aimed at demonstrating adaptive dynamic transcoding and its effect on network stability and bandwidth management.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130170634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. McDonald, Joy Cantalupo, M. DiFrancisco, A. Rennier, Darcy Swain-Walsh, J. Correia, V. Ramaswamy, Cameron Patterson
{"title":"AWS-3 Interference Mitigation: Improving Spectrum Sharing with LTE & 5G Uplink Spectrum Control","authors":"H. McDonald, Joy Cantalupo, M. DiFrancisco, A. Rennier, Darcy Swain-Walsh, J. Correia, V. Ramaswamy, Cameron Patterson","doi":"10.1109/MILCOM47813.2019.9020877","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020877","url":null,"abstract":"This paper describes an interference mitigation technique known as Long Term Evolution (LTE) Uplink (UL) Frequency Avoidance (UFA). To mitigate interference LTE base stations can be configured in such a way as to force User Equipment (UE)s communicating with that base station to avoid transmitting in the passband of narrow-band victim receivers that share the same band. The UFA mechanisms include features for allocating uplink assignments within a cell sector (known colloquially as “notching”) and a second technique where the LTE block size is limited, known as Scalable Carrier Bandwidth Reduction (SCBR). The UFA techniques have been evaluated in the laboratory [1], and criteria for its use in the AWS-3 Coordination Request (CR) process have been defined. This paper describes the mechanisms to accomplish UFA within commercial grade LTE base station equipment (evolved Node B (eNodeB or eNB) and the approach to modeling the resulting emissions for interference analysis. The paper also describes how the same technique could be used in 5G networks and addresses the potential use of this technique to prevent “self-interference” by DoD tactical communications systems in constrained, congested, and contested environments where DoD deploys 4G (LTE) and 5G Radio Access Network (RAN) technologies.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114774289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Use of Cyber Threat Intelligence (CTI) in Support of Developing the Commander's Understanding of the Adversary","authors":"Manisha Parmar, Alberto Domingo","doi":"10.1109/MILCOM47813.2019.9020852","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020852","url":null,"abstract":"Cyber Threat Intelligence (CTI) is a rapidly developing field which has evolved in direct response to exponential growth in cyber related crimes and attacks. CTI supports Communication and Information System (CIS)Security in order to bolster defenses and aids in the development of threat models that inform an organization's decision making process. In a military organization like NATO, CTI additionally supports Cyberspace Operations by providing the Commander with essential intelligence about the adversary, their capabilities and objectives while operating in and through cyberspace. There have been many contributions to the CTI field; a noteworthy contribution is the ATT&CK® framework by the Mitre Corporation. ATT&CK® contains a comprehensive list of adversary tactics and techniques linked to custom or publicly known Advanced Persistent Threats (APT) which aids an analyst in the characterization of Indicators of Compromise (IOCs). The ATT&CK® framework also demonstrates possibility of supporting an organization with linking observed tactics and techniques to specific APT behavior, which may assist with adversary characterization and identification, necessary steps towards attribution. The NATO Allied Command Transformation (ACT) and the NATO Communication and Information Agency (NCI Agency) have been experimenting with the use of deception techniques (including decoys) to increase the collection of adversary related data. The collected data is mapped to the tactics and techniques described in the ATT&CK® framework, in order to derive evidence to support adversary characterization; this intelligence is pivotal for the Commander to support mission planning and determine the best possible multi-domain courses of action. This paper describes the approach, methodology, outcomes and next steps for the conducted experiments.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"76 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134092321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chérifa Boucetta, Aicha Dridi, Hassine Moungla, H. Afifi, A. Kamal
{"title":"Optimizing Drone Deployment for Cellular Communication Coverage During Crowded Events","authors":"Chérifa Boucetta, Aicha Dridi, Hassine Moungla, H. Afifi, A. Kamal","doi":"10.1109/MILCOM47813.2019.9020748","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020748","url":null,"abstract":"In case of unexpected or temporary events, cellular networks can become quickly saturated. A promising solution is using drones as flying base stations. In this article, we address the issue of anomalous behavior within cellular networks that occurs during crowded events. The proposed approach consists of two parts: the detection of overloaded cells using a machine learning algorithm (LSTM - Long Short-Term Memory) and the deployment of drone base stations to assist the cellular network by providing wireless coverage. Initially, we use the LSTM algorithm to analyze the impact of extra-data on the network and detect the peaks of user's demands. Then, we formulate an optimization problem for maximizing the coverage when deploying drones taking into account the energy constraints. The proposed approach is validated using real data-set extracted from the Call Detail Records (CDR) of Milan. Simulation results show that the use of drones can satisfy the quality-of-service requirements of the network.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133171419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xin Wang, Qiao Xiang, J. Tucker, V. Mishra, Y. Yang
{"title":"Dandelion: A Novel, High-Level Programming System for Software Defined Coalitions with Local State Sharing","authors":"Xin Wang, Qiao Xiang, J. Tucker, V. Mishra, Y. Yang","doi":"10.1109/MILCOM47813.2019.9020886","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020886","url":null,"abstract":"Integrating software defined networking into military coalition to realize a software defined coalition (SDC) infrastructure is non-trivial due to the stringent requirements (e.g., real-time, efficiency and reliability) of SDC applications in highly dynamic tactical network environments. Recent designed SDC datapaths improve the performance of SDC applications by offloading complex, stateful operations from the SDC control plane to data plane devices. However, they have two limitations. First, results of offloaded operations (referred to as local state) are not shared between data plane devices, resulting in substantial performance issues in SDC networks. Second, configuring low-level SDC datapaths is time-consuming and error-prone. To address these two issues, in this paper, we design Dandelion, a novel, high-level SDC programming system that allows users to specify the behavior of SDC data plane devices and the datapath configurations can be automatically generated with the local state sharing to efficiently utilize the network resources. We implement a prototype of Dandelion and demonstrate its efficiency and efficacy using experiments. Results show that with Dandelion, the total throughput is two times higher than that of without Dandelion.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116126129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianguo Jiang, Jiuming Chen, Tianbo Gu, K. Choo, Chao Liu, Min Yu, Wei-qing Huang, P. Mohapatra
{"title":"Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection","authors":"Jianguo Jiang, Jiuming Chen, Tianbo Gu, K. Choo, Chao Liu, Min Yu, Wei-qing Huang, P. Mohapatra","doi":"10.1109/MILCOM47813.2019.9020760","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020760","url":null,"abstract":"Anomaly detection generally involves the extraction of features from entities' or users' properties, and the design of anomaly detection models using machine learning or deep learning algorithms. However, only considering entities' property information could lead to high false positives. We posit the importance of also considering connections or relationships between entities in the detecting of anomalous behaviors and associated threat groups. Therefore, in this paper, we design a GCN (graph convolutional networks) based anomaly detection model to detect anomalous behaviors of users and malicious threat groups. The GCN model could characterize entities' properties and structural information between them into graphs. This allows the GCN based anomaly detection model to detect both anomalous behaviors of individuals and associated anomalous groups. We then evaluate the proposed model using a real-world insider threat data set. The results show that the proposed model outperforms several state-of-art baseline methods (i.e., random forest, logistic regression, SVM, and CNN). Moreover, the proposed model can also be applied to other anomaly detection applications.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130304984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuriy Posherstnik, Edward Rocky Rocksvald, Bill Lussier, Mike Makowski
{"title":"Framework for Interoperable Command & Control of Joint Electromagnetic Spectrum Operations","authors":"Yuriy Posherstnik, Edward Rocky Rocksvald, Bill Lussier, Mike Makowski","doi":"10.1109/MILCOM47813.2019.9020957","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020957","url":null,"abstract":"To effectively command and control (C2) joint operations in any domain, a force must be able to understand, plan, decide, direct, and monitor operations; often simultaneously. This is especially applicable to command and control of joint operations in the electromagnetic spectrum (EMS) maneuver space, which affects all domains and military operations. This paper proposes a framework for enabling interoperability amongst systems that support C2. The proposed framework is a combination of six architecture viewpoints (i.e., Capabilities, Operational Activities, Services, Systems, Data, and Standards), combined with a standardized organizational construct that applies across the architecture viewpoints. Together, these elements enable interoperable C2 for any domain by defining a common set of capabilities, activities, systems, services, rules, and standards. This paper defines the framework components, and presents the application of the framework to the C2 of joint EMS operations. This paper lays out the method and approach taken to identify, describe, and diagram the critical elements of C2, as well as important observations and lessons learned that could apply to the C2 of operations in any domain.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127153619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}