420 research outputs found

    AUTONOMOUS MANEUVERING: A DEFENSE ADVANTAGE FOR AFSOC AIRCRAFT

    Get PDF
    The U.S. military continues to operate in increasingly complex security environments and can no longer expect uncontested or dominant superiority in every domain. Aircraft operated by special operations forces (SOF) need improved defensive capabilities to support missions in non-permissive environments. Integrating automation and human-machine teaming into existing defensive capabilities may reduce threat reaction time and increase the effectiveness of defensive maneuvers in manned and unmanned aircraft configurations. This thesis examines the value of aircraft maneuvering as part of a threat reaction to identify situations where human intervention negatively affects timing and accuracy. It also considers opportunities to replicate Merlin Labs' approach to flight automation and incorporate a machine-trained system capable of performing defensive maneuvers into existing aircraft. The analysis indicates aircraft maneuvering is critical to an effective threat reaction, and automating select operator actions can increase survivability against certain surface-to-air threats. This thesis recommends a renewed focus on defensive capabilities for SOF aircraft and endorses integrating onboard autonomous systems into traditionally manned platforms to improve defensive threat reactions. It also advocates for continued research into the use of optionally manned aircraft in SOF missions to refine their operational utility and expand capabilities across a variety of mission platforms.Major, United States Air ForceMajor, United States Air ForceApproved for public release. Distribution is unlimited

    Anomaly detection in competitive multiplayer games

    Get PDF
    As online video games rise in popularity, there has been a significant increase in fraudulent behavior and malicious activity. Numerous methods have been proposed to automate the identification and detection of such behaviors but most studies focused on situations with perfect prior knowledge of the gaming environment, particularly, in regards to the malicious behaviour being identified. This assumption is often too strong and generally false when it comes to real-world scenarios. For these reasons, it is useful to consider the case of incomplete information and combine techniques from machine learning and solution concepts from game theory that are better suited to tackle such settings, and automate the detection of anomalous behaviors. In this thesis, we focus on two major threats in competitive multiplayer games: intrusion and device compromises, and cheating and exploitation. The former is a knowledge-based anomaly detection, focused on understanding the technology and strategy being used by the attacker in order to prevent it from occurring. One of the major security concerns in cyber-security are Advanced Persistent Threats (APT). APTs are stealthy and constant computer hacking processes which can compromise systems bypassing traditional security measures in order to gain access to confidential information held in those systems. In online video games, most APT attacks leverage phishing and target individuals with fake game updates or email scams to gain initial access and steal user data, including but not limited to account credentials and credit card numbers. In our work, we examine the two player game called FlipIt to model covert compromises and stealthy hacking processes in partial observable settings, and show the efficiency of game theory concept solutions and deep reinforcement learning techniques to improve learning and detection in the context of fraud prevention. The latter defines a behavioral-based anomaly detection. Cheating in online games comes with many consequences for both players and companies; hence, cheating detection and prevention is an important part of developing a commercial online game. However, the task of manually identifying cheaters from the player population is unfeasible to game designers due to the sheer size of the player population and lack of test datasets. In our work, we present a novel approach to detecting cheating in competitive multiplayer games using tools from hybrid intelligence and unsupervised learning, and give proof-of-concept experimental results on real-world datasets

    Security Enhanced Applications for Information Systems

    Get PDF
    Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users’ trust as well as the reputation of the system’s stakeholders. Designing and implementing security enhanced systems is of vital importance. Therefore, this book aims to present a number of innovative security enhanced applications. It is titled “Security Enhanced Applications for Information Systems” and includes 11 chapters. This book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network and Cloud environments
    • …
    corecore