2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications最新文献

筛选
英文 中文
Towards an Information Asset-Based Defensive Cyber Damage Assessment Process 基于信息资产的防御性网络损害评估流程
M. Grimaila, L. Fortson
{"title":"Towards an Information Asset-Based Defensive Cyber Damage Assessment Process","authors":"M. Grimaila, L. Fortson","doi":"10.1109/CISDA.2007.368155","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368155","url":null,"abstract":"The use of computers and communication technologies to enhance command and control (C2) processes has yielded enormous benefits in military operations. Commanders are able to make higher quality decisions by accessing a greater number of information resources, obtaining more frequent updates from their information resources, and by correlation between, and across, multiple information resources to reduce uncertainty in the battlespace. However, these benefits do not come without a cost. The reliance on technology results in significant operational risk that is often overlooked and is frequently underestimated. In this research-in-progress paper, we discuss our initial findings in our efforts to improve the defensive cyber battle damage assessment process within US Air Force networks. We have found that the lack of a rigorous, well-documented, information asset-based risk management process results in significant uncertainty and delay when assessing the impact of an information incident.","PeriodicalId":403553,"journal":{"name":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133636291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Computational Verification of System Architectures 系统架构的计算验证
A. K. Zaidi, A. Levis
{"title":"Computational Verification of System Architectures","authors":"A. K. Zaidi, A. Levis","doi":"10.1109/CISDA.2007.368133","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368133","url":null,"abstract":"The paper presents a computational approach for verifying system architectures that employs a modal logic, an architecture design process, and a computer-aided formal model checking technique. The approach is shown to address the traceability issue between the architectural views, developed in accordance to the DoD architecture framework (DoDAF), and the executable model derived from the framework products. It provides an analytical underpinning of the verification of systems architectures, especially when requirements and capabilities of the systems under consideration evolve over time. The approach is presented with the help of an illustrative example.","PeriodicalId":403553,"journal":{"name":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116774248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ATR Applications in Military Missions ATR在军事任务中的应用
Ted Wong
{"title":"ATR Applications in Military Missions","authors":"Ted Wong","doi":"10.1109/CISDA.2007.368131","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368131","url":null,"abstract":"While there has been a nominal effort to develop automatic target recognition (ATR) technologies for military systems for the last couple of decades, there have been relatively few significant breakthroughs. At the same time, the evolution of some of our missions has made it more desirable to achieve solutions from this technology to meet some of the escalating operational challenges. This paper is intended to identify and characterize some areas where ATR algorithms might materially improve our operational capability","PeriodicalId":403553,"journal":{"name":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117159297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Comparison Between Signature and GP-Based IDSs for Link Layer Attacks on WiFi Networks WiFi链路层攻击的签名攻击与gps攻击比较
A. Makanju, P. LaRoche, A. N. Zincir-Heywood
{"title":"A Comparison Between Signature and GP-Based IDSs for Link Layer Attacks on WiFi Networks","authors":"A. Makanju, P. LaRoche, A. N. Zincir-Heywood","doi":"10.1109/CISDA.2007.368156","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368156","url":null,"abstract":"Data link layer attacks on WiFi networks are known to be one of the weakest points of WiFi networks. While these attacks are very simple in implementation, their effect on WiFi networks can be devastating. To this end, several intrusion detection systems (IDS) have been employed to detect these attacks. In this paper, we compare the ability of Snort-Wireless and a genetic programming (GP) based intrusion detector, in the detection of a particular data link layer attack, namely the deauthentication attack. We focus particularly on a scenario where the attacker stealthily injects the attack frames into the target network. Results show that the GP based detection system is much more robust against the different versions of the attack compared to Snort-Wireless and can achieve a detection rate in average 100% and a false positive rate in average 0.1%","PeriodicalId":403553,"journal":{"name":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","volume":"38 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131999327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Computationally Derived Models of Adversary Organizations 对手组织的计算衍生模型
Smriti Kansal, Ashraf M. Abusharekh, A. Levis
{"title":"Computationally Derived Models of Adversary Organizations","authors":"Smriti Kansal, Ashraf M. Abusharekh, A. Levis","doi":"10.1109/CISDA.2007.368140","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368140","url":null,"abstract":"An extension to the lattice algorithm for designing decision-making organizations subject to cultural constraints is presented. Hofstede dimensions have been used to incorporate cultural attributes in the design process in the form of constraints on the allowable interactions within the organization. An example is used to illustrate the approach.","PeriodicalId":403553,"journal":{"name":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123724463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Anomaly Detection for Application Level Network Attacks Using Payload Keywords 基于负载关键字的应用层网络攻击异常检测
Like Zhang, G. White
{"title":"Anomaly Detection for Application Level Network Attacks Using Payload Keywords","authors":"Like Zhang, G. White","doi":"10.1109/CISDA.2007.368151","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368151","url":null,"abstract":"Network anomaly intrusion detection is designed to provide in-depth defense against zero-day attacks. However, attacks often occur at the application level, which means they are payload associated. Since traditional anomaly detection works by monitoring packet headers it provides little support for defending against such activities. In this paper, we will explore how the packet payload can be used for identifying application level attacks. First we will discuss the current status of network anomaly detection, and emphasize the importance of payload based detection research using existing problems. Then we provide a brief introduction to several related approaches on this topic. Based on the discussion, an efficient method to detect payload related attacks will then be proposed. The method is divided into a training phase and a detection phase. In the training phase, we will perform principal component analysis (PCA) on several important packet fields to reduce the data dimension, and then construct the most appropriate profile based on the PCA results. In the detection phase, an anomaly score will be assigned to each incoming packet based on the profile. We then present the experiment based on the DARPA '99 dataset with details to explain our approach. Comparison with other similar mechanisms demonstrates the advantage of the proposed method at identifying payload related attacks.","PeriodicalId":403553,"journal":{"name":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125090786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Computational Intelligence Support for Smart Queries and Adaptive Data 智能查询和自适应数据的计算智能支持
T. Martin, B. Azvine, Yun Shen
{"title":"Computational Intelligence Support for Smart Queries and Adaptive Data","authors":"T. Martin, B. Azvine, Yun Shen","doi":"10.1109/CISDA.2007.368138","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368138","url":null,"abstract":"The UK initiative in \"network enabled capability\" (NEC) can be loosely summarised as \"right information, right place, right time - and not too much\". It is closely related to the US concept of \"network-centric operations\". A core requirement for NEC is \"active intelligence\" where information streams from multiple sources can be dynamically blended and fused into the relevant form for a decision maker. We have identified \"smart queries\" and \"adaptive data\" (SQuAD) as the key components of active intelligence, and these form the basis of a current research programme. In this paper we outline three existing research streams that can contribute to the SQuAD project by using soft computing and computational intelligence to merge semi-structured data and taxonomic categories","PeriodicalId":403553,"journal":{"name":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125187009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intelligent Controller for Collaborative Unmanned Air Vehicles 协同无人机的智能控制器
Gregory L. Sinsley, Jodi A. Miller, L. Long, B. Geiger, A. Niessner, J. Horn
{"title":"An Intelligent Controller for Collaborative Unmanned Air Vehicles","authors":"Gregory L. Sinsley, Jodi A. Miller, L. Long, B. Geiger, A. Niessner, J. Horn","doi":"10.1109/CISDA.2007.368146","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368146","url":null,"abstract":"This paper describes an implementation of an autonomous intelligent controller (IC) architecture for collaborative control of multiple unmanned aerial vehicles (UAVs). Collaborative capabilities include formation flying, search of an area, and cooperative investigation of a target. The IC provides capabilities for sensor data fusion, internal representation of the real-world, and autonomous decision making based on the IC's world model and mission goals. Results of flight tests demonstrating these capabilities are presented. Future work, such as integration of different sensors and collaboration with heterogeneous vehicles, is discussed.","PeriodicalId":403553,"journal":{"name":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133782433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Course of Action Analysis in a Cultural Landscape Using Influence Nets 运用影响网进行文化景观中的行动过程分析
Lee W. Wagenhals, A. Levis
{"title":"Course of Action Analysis in a Cultural Landscape Using Influence Nets","authors":"Lee W. Wagenhals, A. Levis","doi":"10.1109/CISDA.2007.368143","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368143","url":null,"abstract":"Since 1992 the nature of military operations has changed. The type of objectives that the military has to address has expanded well beyond those of traditional major combat operations. As military operations become other than conventional war - whether against transnational terrorist threats or conducting stabilization operations - the need to broaden the focus of models that support effects based planning and operations has become critical. One major present weakness is the absence of socio-cultural attributes in the models used for course of action selection and effects based planning. This paper illustrates an approach that enables analysts to evaluate a complex situation in which an adversary is embedded in a society from which it is receiving support. The paper describes a layered modeling approach that enables the analysts to examine and explain how actions of the military and other entities may results in desired or undesired effects, both on the adversary and on the population as a whole, and shows several techniques for comparing contemplated courses of action","PeriodicalId":403553,"journal":{"name":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132152467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Intrusion Detection Model Based On Particle Swarm Optimization and Support Vector Machine 基于粒子群优化和支持向量机的入侵检测模型
Surat Srinoy
{"title":"Intrusion Detection Model Based On Particle Swarm Optimization and Support Vector Machine","authors":"Surat Srinoy","doi":"10.1109/CISDA.2007.368152","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368152","url":null,"abstract":"Advance in information and communication technologies, force us to keep most of the information electronically, consequently, the security of information has become a fundamental issue. The traditional intrusion detection systems look for unusual or suspicious activity, such as patterns of network traffic that are likely indicators of unauthorized activity. However, normal operation often produces traffic that matches likely \"attack signature\", resulting in false alarms. One main drawback is the inability of detecting new attacks which do not have known signatures. In this paper particle swarm optimization (PSO) is used to implement a feature selection, and support vector machine (SVMs) with the one-versus-rest method serve as a fitness function of PSO for classification problems from the literature. Experimental result shows that our method allows us to recognize not only known attacks but also to detect suspicious activity that may be the result of a new, unknown attack. Our method simplifies features effectively and obtains a higher classification accuracy compared to other methods","PeriodicalId":403553,"journal":{"name":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115365581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信