Publications

Refine Results

(Filters Applied) Clear All

Cyber situational awareness through operational streaming analysis

Published in:
MILCOM 2011, IEEE Military Communications Conf., 7-10 November 2011, pp. 1152-1157.

Summary

As the scope and scale of Internet traffic continue to increase the task of maintaining cyber situational awareness about this traffic becomes ever more difficult. There is strong need for real-time on-line algorithms that characterize high-speed / high-volume data to support relevant situational awareness. Recently, much work has been done to create and improve analysis algorithms that operate in a streaming fashion (minimal CPU and memory utilization) in order to calculate important summary statistics (moments) of this network data for the purpose of characterization. While the research literature contains improvements to streaming algorithms in terms of efficiency and accuracy (i.e. approximation with error bounds), the literature lacks research results that demonstrate streaming algorithms in operational situations. The focus of our work is the development of a live network situational awareness system that relies upon streaming algorithms for the determination of important stream characterizations and also for the detection of anomalous behavior. We present our system and discuss its applicability to situational awareness of high-speed networks. We present refinements and enhancements that we have made to a well-known streaming algorithm and improve its performance as applied within our system. We also present performance and detection results of the system when it is applied to a live high-speed mid-scale enterprise network.
READ LESS

Summary

As the scope and scale of Internet traffic continue to increase the task of maintaining cyber situational awareness about this traffic becomes ever more difficult. There is strong need for real-time on-line algorithms that characterize high-speed / high-volume data to support relevant situational awareness. Recently, much work has been done...

READ MORE

A usable interface for location-based access control and over-the-air keying in tactical environments

Published in:
MILCOM 2011, IEEE Military Communications Conf., 7-10 November 2011, pp. 1480-1486.

Summary

This paper presents a usable graphical interface for specifying and automatically enacting access control rules for applications that involve dissemination of data among mobile tactical devices. A specific motivating example is unmanned aerial vehicles (UAVs), where the mission planner or operator needs to control the conditions under which specific receivers can access the UAV?s video feed. We implemented a prototype of this user interface as a plug-in for FalconView, a popular mission planning application.
READ LESS

Summary

This paper presents a usable graphical interface for specifying and automatically enacting access control rules for applications that involve dissemination of data among mobile tactical devices. A specific motivating example is unmanned aerial vehicles (UAVs), where the mission planner or operator needs to control the conditions under which specific receivers...

READ MORE

Dedicated vs. distributed: a study of mission survivability metrics

Published in:
MILCOM 2011, IEEE Military Communications Conf., 7-10 November 2011, pp. 1345-1350.

Summary

A traditional trade-off when designing a mission critical network is whether to deploy a small, dedicated network of highly reliable links (e.g. dedicated fiber) or a largescale, distributed network of less reliable links (e.g. a leased line over the Internet). In making this decision, metrics are needed that can express the reliability and security of these networks. Previous work on this topic has widely focused on two approaches: probabilistic modeling of network reliabilities and graph theoretic properties (e.g. minimum cutset). Reliability metrics do not quantify the robustness, the ability to tolerate multiple link failures, in a distributed network. For example, a fully redundant network and a single link can have the same overall source-destination reliability (0.9999), but they have very different robustness. Many proposed graph theoretic metrics are also not sufficient to capture network robustness. Two networks with identical metric values (e.g. minimum cutset) can have different resilience to link failures. More importantly, previous efforts have mainly focused on the source-destination connectivity and in many cases it is difficult to extend them to a general set of requirements. In this work, we study network-wide metrics to quantitatively compare the mission survivability of different network architectures when facing malicious cyber attacks. We define a metric called relative importance (RI), a robustness metric for mission critical networks, and show how it can be used to both evaluate mission survivability and make recommendations for its improvement. Additionally, our metric can be evaluated for an arbitrarily general set of mission requirements. Finally, we study the probabilistic and deterministic algorithms to quantify the RI metric and empirically evaluate it for sample networks.
READ LESS

Summary

A traditional trade-off when designing a mission critical network is whether to deploy a small, dedicated network of highly reliable links (e.g. dedicated fiber) or a largescale, distributed network of less reliable links (e.g. a leased line over the Internet). In making this decision, metrics are needed that can express...

READ MORE

Efficient transmission of DoD PKI certificates in tactical networks

Published in:
MILCOM 2011, IEEE Military Communications Conf., 7-10 November 2011, pp. 1739-1747.

Summary

The DoD vision of real-time information sharing and net-centric services available to warfighters at the tactical edge is challenged by low-bandwidth and high-latency tactical network links. Secured tactical applications require transmission of digital certificates that contribute a major portion of data in most secure sessions, which further increases response time for users and drains device power. In this paper we present a simple and practical approach to alleviating this problem. We develop a dictionary of data common across DoD PKI certificates to prime general-purpose data compression of certificates, resulting in a significant reduction (about 50%) of certificate sizes. This reduction in message size translates in to faster response times for the users. For example, a mutual authentication of a client and a server over the Iridium satellite link is expected to be sped up by as much as 3 sec. This approach can be added directly to tactical applications with minimal effort, or it can be deployed as part of an intercepting network proxy, completely transparent to applications.
READ LESS

Summary

The DoD vision of real-time information sharing and net-centric services available to warfighters at the tactical edge is challenged by low-bandwidth and high-latency tactical network links. Secured tactical applications require transmission of digital certificates that contribute a major portion of data in most secure sessions, which further increases response time...

READ MORE

High-power, low-noise 1.5-um slab-coupled optical waveguide (SCOW) emitters: physics, devices, and applications

Summary

We review the development of a new class of high-power, edge-emitting, semiconductor optical gain medium based on the slab-coupled optical waveguide (SCOW) concept. We restrict the scope to InP-based devices incorporating either InGaAsP or InGaAlAs quantum-well active regions and operating in the 1.5-μm-wavelength region. Key properties of the SCOW gain medium include large transverse optical mode dimensions (>;5 × 5 μm), ultralow optical confinement factor (Γ ~ 0.25-1%), and small internal loss coefficient (α i ~ 0.5 cm-1). These properties have enabled the realization of 1) packaged Watt-class semiconductor optical amplifiers (SOAs) having low-noise figure (4-5 dB), 2) monolithic passively mode-locked lasers generating 0.25-W average output power, 3) external-cavity fiber-ring actively mode-locked lasers exhibiting residual timing jitter of
READ LESS

Summary

We review the development of a new class of high-power, edge-emitting, semiconductor optical gain medium based on the slab-coupled optical waveguide (SCOW) concept. We restrict the scope to InP-based devices incorporating either InGaAsP or InGaAlAs quantum-well active regions and operating in the 1.5-μm-wavelength region. Key properties of the SCOW gain...

READ MORE

MCE training techniques for topic identification of spoken audio documents

Published in:
IEEE Trans. Audio, Speech, Language Proc., Vol. 19, No. 8, November 2011, pp. 2451-2461.

Summary

In this paper, we discuss the use of minimum classification error (MCE) training as a means for improving traditional approaches to topic identification such as naive Bayes classifiers and support vector machines. A key element of our new MCE training techniques is their ability to efficiently apply jackknifing or leave-one-out training to yield improved models which generalize better to unseen data. Experiments were conducted using recorded human-human telephone conversations from the Fisher Corpus using feature vector representations from word-based automatic speech recognition lattices. Sizeable improvements in topic identification accuracy using the new MCE training techniques were observed.
READ LESS

Summary

In this paper, we discuss the use of minimum classification error (MCE) training as a means for improving traditional approaches to topic identification such as naive Bayes classifiers and support vector machines. A key element of our new MCE training techniques is their ability to efficiently apply jackknifing or leave-one-out...

READ MORE

Decomposition methods for optimized collision avoidance with multiple threats

Published in:
DASC 2011, 30th IEEE/AIAA Digital Avionics Systems Conference, 16-20 October 2011, pp. 1D2.

Summary

Aircraft collision avoidance systems assist in the resolution of collision threats from nearby aircraft by issuing avoidance maneuvers to pilots. Encounters where multiple aircraft pose a threat, though rare, can be difficult to resolve because a maneuver that might resolve a conflict with one aircraft might induce conflicts with others. Recent efforts to develop robust collision avoidance systems for single-threat encounters have involved modeling the problem as a Markov decision process and applying dynamic programming to solve for the optimal avoidance strategy. Because this methodology does not scale well to multiple threats, this paper evaluates a variety of decomposition methods that leverage the optimal avoidance strategy for single-threat encounters.
READ LESS

Summary

Aircraft collision avoidance systems assist in the resolution of collision threats from nearby aircraft by issuing avoidance maneuvers to pilots. Encounters where multiple aircraft pose a threat, though rare, can be difficult to resolve because a maneuver that might resolve a conflict with one aircraft might induce conflicts with others...

READ MORE

Estimating the likelihood of success in departure management strategies during convective weather

Published in:
Proc. 30th IEEE/AIAA Digital Avionics Systems Conference, DASC, 16-20 October 2011, pp. 6D4.

Summary

The presence of convective weather (thunderstorms) in terminal and nearby en route airspace of major metroplex areas can have significant impacts on departure operations. Traffic on departure routes impacted by convective weather may be constrained by miles-in-trail (MIT) restrictions, to allow controllers the time needed to maneuver individual flights around thunderstorms that pilots wish to avoid. When the workload required to manage traffic flows becomes too great, departure routes may be closed. Departures still on the ground that are filed on closed or restricted routes may face significant delays as they wait for clearance on their filed route, or for a viable reroute to be implemented. The solution proposed in concepts such as the Integrated Departure Route Planning tool (IDRP) [1] is the use of weather and departure demand forecasts to plan and implement reroutes to avoid weather and volume congestion proactively, well in advance of route restrictions or closures.
READ LESS

Summary

The presence of convective weather (thunderstorms) in terminal and nearby en route airspace of major metroplex areas can have significant impacts on departure operations. Traffic on departure routes impacted by convective weather may be constrained by miles-in-trail (MIT) restrictions, to allow controllers the time needed to maneuver individual flights around...

READ MORE

Initial validation of a convective weather avoidance model (CWAM) in departure airspace

Published in:
DASC 2011, 30th IEEE/AIAA Digital Avionics Systems Conference, 16-20 October 2011, pp. 3A2.

Summary

The Convective Weather Avoidance Model (CWAM) translates gridded, deterministic weather observations and forecasts into Weather Avoidance Fields (WAF). The WAF gives the probability, at each point in the grid, that a pilot will choose to deviate around convective weather at that location. CWAM have been developed and validated for en route, high altitude, level flight, low altitude level flight, and for descending arrivals. A heuristic CWAM for departures was also developed and deployed as part of the Route Availability Planning Tool (RAPT) prototype development in New York and Chicago. This paper presents an evaluation of the departure CWAM that is currently deployed as part of RAPT, based on an analysis of departure traffic in the Chicago terminal area during convective weather events.
READ LESS

Summary

The Convective Weather Avoidance Model (CWAM) translates gridded, deterministic weather observations and forecasts into Weather Avoidance Fields (WAF). The WAF gives the probability, at each point in the grid, that a pilot will choose to deviate around convective weather at that location. CWAM have been developed and validated for en...

READ MORE

Position validation strategies using partially observable Markov decision processes

Published in:
Proc. 30th IEEE/AIAA Digital Avionics Systems Conference, DASC, 16-20 October 2011, pp. 4A2.

Summary

The collision avoidance system that is currently deployed worldwide relies upon radar beacon surveillance. With its broad deployment over the next decade, aviation surveillance based on Automatic Dependent Surveillance-Broadcast (ADS-B) reports may reduce the need for frequent beacon interrogation over the communication channel, but there is a risk of ADS-B providing erroneous data to the collision avoidance system, resulting in a potential collision. Hence, there is a need to use beacon interrogation to periodically validate ADS-B position reports. Various threshold-based validation strategies based on proximity and closure rate have been suggested to reduce channel congestion while maintaining the reliability of the collision avoidance system. This paper shows how to model the problem of deciding when to validate ADS-B reports as a partially observable Markov decision process, and it explains how to solve for the optimal validation strategy. The effectiveness of this approach is demonstrated in simulation.
READ LESS

Summary

The collision avoidance system that is currently deployed worldwide relies upon radar beacon surveillance. With its broad deployment over the next decade, aviation surveillance based on Automatic Dependent Surveillance-Broadcast (ADS-B) reports may reduce the need for frequent beacon interrogation over the communication channel, but there is a risk of ADS-B...

READ MORE