The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In crypto-partitioned networks classified clear text enclaves (i.e., red enclaves) are interconnected over an enciphered unclassified transit network (i.e., black network) via IPSEC tunnels. Thus, packets are encrypted before they are allowed to cross from red networks to a shared black network. Currently, there is no solution that can provide efficient end-to-end IntServ QoS signaling across crypto-partitioned...
While SOA promises great benefits in productivity and flexibility, the tools for securing these systems continue to lag behind. The ideal of SOA security is to provide trusted containers and frameworks that enforce policies established during deployment, and remove security logic and policy from application code completely. Standards such as WS-Security address some of the issues, but enterprise systems...
Many Programs of Record are using Service Oriented Architecture (SOA) approaches and supporting technologies to realize net-centricity requirements. Furthermore, emerging solutions offer data sharing across adjacent security enclaves for these programs, including Cross Domain Joint Battlespace Infosphere (XJBI) by AFRL, Cross Domain Web Services Gateway by DISA, and the Cross Domain Collaborative...
In this paper, we present an automated region-of-interest-based video coding system for use in ultra-low-bandwidth applications. Region-of-interest (ROI) coding methodology specifies that targets or ROIs be coded at higher fidelity using a greater number of available bits, while the remainder of the scene or background is coded using fewer bits. This allows the target regions within the scene to be...
Determination of appropriate response to information system attack is jointly determined by confidence of classification, nature (type) of attack, and confidence in effectiveness of response. In this paper we present a technique to rapidly assess similarity of observed behavior to attack or normal models: displaying the similarity of observed data to learned minimum description length models for normal...
Wireless sensor networks (WSNs) are becoming increasingly important because of their reduced cost and a range of real world military applications. The ability to update the code wirelessly is important for their highly dynamic environments. The need to re-program a wireless sensor network may arise from changing application requirements, bug fixes, or during the application development cycle. However,...
Daily sensor data volumes are increasing from gigabytes to multiple terabytes. The manpower and resources needed to analyze the increasing amount of data are not growing at the same rate. Current volumes of diverse data, both live streaming and historical, are not fully analyzed. Analysts are left mostly to analyzing the individual data sources manually. This is both time consuming and mentally exhausting...
During the last decade, intrusion detection systems (IDSs) have become a widely used measure for security management. However, these systems often generate many false positives and irrelevant alerts. In this paper, we propose a data mining based real-time method for distinguishing important network IDS alerts from frequently occurring false positives and events of low importance. Unlike conventional...
Dynamic spectrum access (DSA) provides a more flexible spectrum management method versus the current command and control method and promises much higher spectrum utilization efficiency. By this paradigm, secondary users can use vacant spectrum while guaranteeing non-interference to incumbent users. Therefore, spectrum awareness is a required function in DSA, and cooperative spectrum sensing is widely...
Privacy, authentication, confidentiality and non repudiation are the most desired security attributes for all vehicular ad hoc network (VANET) applications. A lot of solutions have been presented to address these issues. However, they are mostly dependent on centralized certificate architecture and some sort of hardware-based security. These solutions are expensive to carry out and lack the incentive...
An organization consists of many resources and entities who want to access those resources. Not all entities are granted full access rights to every resource, so there must be a Trust Management System (TMS) in place to enforce access rights. In this paper, we present a new Hybrid Trust Management System (HTMS) that combines Role Based Trust Management (RBTM) with Reputation Systems (RS). At any point...
The Tactical Ground Reporting (TIGR) system provides a unique multimedia patrol preparation and debriefing tool tailored to the needs of the patrol leader, and is used by all U.S. Army brigades in Iraq and Afghanistan. The distribution of data from geographically dispersed patrols requires network awareness and policy flexibility. The TIGR system utilizes an application overlay on to the tactical...
In this paper, we address the problem of collaborative video caching in mobile ad-hoc networks. We consider network portraying static video server with wired interface to gateway node that is equipped with wireless interfaces, other nodes are requiring access to the video streams that is stored at video server. In order to reduce the average access latency as well as enhance the video accessibility,...
Polymorphic attacks threaten to make many intrusion detection schemes ineffective. In order to address the threat of advanced attacks, model based techniques are required. In this paper we improve our Grammar Based Modeling techniques to be more resilient to attacks that change in form by using advanced classification techniques. Similarity distances from known models are input as features input to...
Emerging hybrid satellite communications and wireless network architectures support high bandwidth services and applications for tactical users. In this paper we propose a cross- layer design approach focusing on physical layer interaction on the application layer using an OPNET simulation environment. This paper studies the effect of fading on dynamic resource allocations and the impact of rain fading...
Web services technology is considered a key enabler for NEC. However, existing Web service protocols are designed for use over the Internet, and cannot necessarily be directly applied in military tactical networks where bandwidths are low and communication disruptions are frequent. In this paper we present a novel prototype proxy solution which adds both delay and disruption tolerance to SOAP. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.