491 research outputs found

    A Survey of Network Requirements for Enabling Effective Cyber Deception

    Full text link
    In the evolving landscape of cybersecurity, the utilization of cyber deception has gained prominence as a proactive defense strategy against sophisticated attacks. This paper presents a comprehensive survey that investigates the crucial network requirements essential for the successful implementation of effective cyber deception techniques. With a focus on diverse network architectures and topologies, we delve into the intricate relationship between network characteristics and the deployment of deception mechanisms. This survey provides an in-depth analysis of prevailing cyber deception frameworks, highlighting their strengths and limitations in meeting the requirements for optimal efficacy. By synthesizing insights from both theoretical and practical perspectives, we contribute to a comprehensive understanding of the network prerequisites crucial for enabling robust and adaptable cyber deception strategies

    Ubiquitous robust communications for emergency response using multi-operator heterogeneous networks

    Get PDF
    A number of disasters in various places of the planet have caused an extensive loss of lives, severe damages to properties and the environment, as well as a tremendous shock to the survivors. For relief and mitigation operations, emergency responders are immediately dispatched to the disaster areas. Ubiquitous and robust communications during the emergency response operations are of paramount importance. Nevertheless, various reports have highlighted that after many devastating events, the current technologies used, failed to support the mission critical communications, resulting in further loss of lives. Inefficiencies of the current communications used for emergency response include lack of technology inter-operability between different jurisdictions, and high vulnerability due to their centralized infrastructure. In this article, we propose a flexible network architecture that provides a common networking platform for heterogeneous multi-operator networks, for interoperation in case of emergencies. A wireless mesh network is the main part of the proposed architecture and this provides a back-up network in case of emergencies. We first describe the shortcomings and limitations of the current technologies, and then we address issues related to the applications and functionalities a future emergency response network should support. Furthermore, we describe the necessary requirements for a flexible, secure, robust, and QoS-aware emergency response multi-operator architecture, and then we suggest several schemes that can be adopted by our proposed architecture to meet those requirements. In addition, we suggest several methods for the re-tasking of communication means owned by independent individuals to provide support during emergencies. In order to investigate the feasibility of multimedia transmission over a wireless mesh network, we measured the performance of a video streaming application in a real wireless metropolitan multi-radio mesh network, showing that the mesh network can meet the requirements for high quality video transmissions

    A STUDY OF SPACE-BASED SOLAR POWER SYSTEMS

    Get PDF
    Space-Based Solar Power (SBSP) is best defined as delivering meaningful amounts of energy without moving or employing mass between the transmitter and receiver. The current modus operandi for the Department of Defense (DoD) requires the delivery of energy by physical transport of fossil fuels or its derivatives, which is burdensome, costly, and dangerous in the face of threats. SBSP is known to be technically possible, with varying degrees of success, from ground-based wireless power transmission demonstrations; integrated solar collection, conversion, and transmission systems development; and microwave conversion and rectifying efficiency studies, but a full end-to-end SBSP system has yet to be realized. This thesis aims to explore SBSP's utility in DoD operations at the tactical edge, serving the warfighters at forward operating bases as well as expeditionary forces where power infrastructure is problematic or extant. A collection of SBSP research, studies, and articles was pored over to identify the major stakeholders for such a system, analyze their requirements, and identify a valid reference architecture to maximize the SBSP solution space. This thesis's conclusive results can serve as a baseline for further research in this field. The international community is already aggressively underway in SBSP system design, and the results herein highlight the need for the DoD to act as a leader in this space decisively and quickly.Civilian, Department of the NavyApproved for public release. Distribution is unlimited

    An information security governance model for industrial control systems

    Get PDF
    Industrial Control Systems (ICS) is a term used to describe several types of control systems, including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS) and Programmable Logic Controllers (PLC). These systems consist of a combination of control components (e.g. electrical, mechanical, pneumatic) which act together to achieve an industrial objective (e.g., manufacturing, transportation of matter or energy). ICS play a fundamental role in critical infrastructures such as electricity grids, oil, gas and manufacturing industries. Initially ICS had little resemblance to typical enterprise IT systems; they were isolated and running proprietary control protocols using specialized hardware and software. However, with initiatives such as Industry 4.0 and Industrial Internet of Things (IIoT), the nature of ICS has changed significantly. There is an ever-increasing use of commercial operating systems and standard protocols like TCP/IP and Ethernet. Consequently, modern ICS are more and more resembling conventional enterprise IT systems, and it is a well-known fact that these IT systems and networks are known to be vulnerable and that they require extensive management to ensure Confidentiality, Integrity, and Availability. Since ICS are now adopting conventional IT characteristics they are also accepting the associated risks. However, owing to the functional area of ICS, the consequences of these threats are much more severe than those of enterprise IT systems. The need to manage security for these systems with highly skilled IT personnel has become essential. Therefore, this research was focussed to identify which unique security controls for ICS and enterprise IT systems can be combined and/or tailored to provide the organization with a single set of comprehensive security controls. By doing an investigation on existing standards and best practices for both enterprise IT and ICS environments, this study has produced a single set of security controls and presented how the security controls can be integrated into an existing information security governance model which organizations can use as a basis for generating a security framework, used not only to secure their enterprise IT systems, but also including the security of their ICS

    U.S. Unmanned Aerial Vehicles (UAVS) and Network Centric Warfare (NCW) impacts on combat aviation tactics from Gulf War I through 2007 Iraq

    Get PDF
    Unmanned, aerial vehicles (UAVs) are an increasingly important element of many modern militaries. Their success on battlefields in Afghanistan, Iraq, and around the globe has driven demand for a variety of types of unmanned vehicles. Their proven value consists in low risk and low cost, and their capabilities include persistent surveillance, tactical and combat reconnaissance, resilience, and dynamic re-tasking. This research evaluates past, current, and possible future operating environments for several UAV platforms to survey the changing dynamics of combat-aviation tactics and make recommendations regarding UAV employment scenarios to the Turkish military. While UAVs have already established their importance in military operations, ongoing evaluations of UAV operating environments, capabilities, technologies, concepts, and organizational issues inform the development of future systems. To what extent will UAV capabilities increasingly define tomorrow's missions, requirements, and results in surveillance and combat tactics? Integrating UAVs and concepts of operations (CONOPS) on future battlefields is an emergent science. Managing a transition from manned- to unmanned and remotely piloted aviation platforms involves new technological complexity and new aviation personnel roles, especially for combat pilots. Managing a UAV military transformation involves cultural change, which can be measured in decades.http://archive.org/details/usunmannedaerial109454211Turkish Air Force authors.Approved for public release; distribution is unlimited

    DRONE DELIVERY OF CBNRECy – DEW WEAPONS Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD)

    Get PDF
    Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD) is our sixth textbook in a series covering the world of UASs and UUVs. Our textbook takes on a whole new purview for UAS / CUAS/ UUV (drones) – how they can be used to deploy Weapons of Mass Destruction and Deception against CBRNE and civilian targets of opportunity. We are concerned with the future use of these inexpensive devices and their availability to maleficent actors. Our work suggests that UASs in air and underwater UUVs will be the future of military and civilian terrorist operations. UAS / UUVs can deliver a huge punch for a low investment and minimize human casualties.https://newprairiepress.org/ebooks/1046/thumbnail.jp

    Test and evaluation of a prototyped sensor-camera network for persistent intelligence, surveillance, and reconnaissance in support of tactical coalition networking environments

    Get PDF
    This thesis investigated the feasibility of deploying an integrated sensor-camera network in military and law enforcement applications. The system was built using entirely commercial-off-the-shelf technologies. The prototype used the unattended ground sensors combined with digital video surveillance cameras to provide accurate real-time situational awareness, persistent intelligence and remote security. A robust testing and evaluation plan was created to measure the system's performance based on specific metrics. The tests focused primarily on the capabilities of the sensor aspect of the network. Tests were conducted to determine the maximum detection range, probabilities of detection, maximum communications range, and battery life. Mathematical models were created to assist network planners. Additionally, the prototyped system was tested through field exercises as part of the Naval Postgraduate School's Coalition Operating Area Surveillance and Targeting System field demonstrations in California and northern Thailand. Although the sensing capabilities exceeded the minimum metrics, the system was not suitable for use in military applications. However, the prototyped network would work well in less demanding law enforcement environments. Additionally, the feasibility and the need to develop an integrated sensor-camera network were demonstrated.http://archive.org/details/testndevaluation109452780US Navy (USN) author.Approved for public release; distribution is unlimited

    Trust and Suspicion as a Function of Cyber Security in Human Machine Team (HMT) of Unmanned Systems

    Get PDF
    The research focuses on cyber-attacks on cyber-physical systems of the unmanned vehicles that are characteristically used in the military, particularly the Air Force. Unmanned systems are exposed to various risks as the capacity of cyber attackers continue to expand, raising the need for speedy and immediate responses. The advances in military technologies form the basis of the research that explores the challenges faced in the timely detection and response to cyber-attacks. The purpose of the research is to study the connections between operator suspicion and the detection and response to cyber-attacks alongside the identification of theory of suspicion as the theoretical framework. The paper further presents the experiment used and the interview questions that offer the basis for the recommendations and importance of the research while answering the research questions. The conclusion from the literature review, interview, and experiment indicates the need for training among operators in the Air Force to reinforce their capacity in the detection and response to cyber-attacks and other adverse events that could compromise the execution of the mission established for unmanned systems. The research offers recommendations that can be implemented by the Royal Saudi Air Force (RSAF) in enhancing the security measures of unmanned systems
    • …
    corecore