Search For:

Displaying 1-8 out of 8 total
Designing an Optimized Alert System Based on Geospatial Location Data
Found in: 2014 47th Hawaii International Conference on System Sciences (HICSS)
By Kimberly Zeitz,Randy Marchany,Joseph Tront
Issue Date:January 2014
pp. 4159-4168
Optimizing responses to various crises is a critical task for the government, institutions, first responders, and everyone involved in public safety. This paper describes the design methodology of ongoing research for planning, implementing, and analyzing ...
   
The Blind Man's Bluff Approach to Security Using IPv6
Found in: IEEE Security & Privacy Magazine
By Matthew Dunlop,Stephen Groat,William Urbanski,Randy Marchany,Joseph Tront
Issue Date:July 2012
pp. 35-43
Most networks today employ static network defenses. The problem with static defenses is that adversaries have unlimited time to circumvent them. This article proposes a moving-target defense based on the Internet Protocol version 6 (IPv6) that dynamically ...
 
Using an IPv6 moving target defense to protect the Smart Grid
Found in: Innovative Smart Grid Technologies, IEEE PES
By Stephen Groat,Matthew Dunlop,William Urbanksi,Randy Marchany,Joseph Tront
Issue Date:January 2012
pp. 1-7
As advanced Internet Protocol (IP)-based communication systems are proposed for the Smart Grid, security solutions must be developed which address not only the security of the communications, but also the security of the communicating systems. To support t...
 
The Good, the Bad, the IPv6
Found in: Communication Networks and Services Research, Annual Conference on
By Matthew Dunlop, Stephen Groat, Randy Marchany, Joseph Tront
Issue Date:May 2011
pp. 77-84
As more network-capable devices are developed, it becomes easier for us to remain connected to our friends, colleagues, and even our homes. Unfortunately, it becomes easier for unintended third parties to remain connected to us as well. The impact of this ...
 
IPv6: Nowhere to Run, Nowhere to Hide
Found in: Hawaii International Conference on System Sciences
By Stephen Groat, Matthew Dunlop, Randy Marchany, Joseph Tront
Issue Date:January 2011
pp. 1-10
Due to a large address space, Internet Protocol version 6 (IPv6) uses stateless address autoconfiguration to assign network addresses to hosts. This unmanaged technique creates a static value derived from the Media Access Control (MAC) address of a network...
   
Optimizing a network layer moving target defense for specific system architectures
Found in: 2013 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS)
By Owen Hardman,Stephen Groat,Randy Marchany,Joseph Tront
Issue Date:October 2013
pp. 117-118
Complex defenses, such as moving target defenses, exist to help protect against threats. While these new forms of defense offer increased security, they are resource intensive and cannot be run on many new classes of network connected mobile systems. To pr...
   
Using transport layer multihoming to enhance network layer moving target defenses
Found in: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW '13)
By Joseph Tront, Reese Moore
Issue Date:January 2013
pp. 1-4
As systems and networks begin to transition to the Internet Protocol version 6 (IPv6), the immense address space available in the new protocol allows for devices to maintain multiple addresses and to change addresses frequently. These new capabilities enco...
     
The privacy implications of stateless IPv6 addressing
Found in: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW '10)
By Joseph Tront, Matthew Dunlop, Randy Marchany, Stephen Groat
Issue Date:April 2010
pp. 1-4
Current implementations of the Internet Protocol version 6 (IPv6) use a static value determined from the Media Access Control (MAC) address as the host portion, or interface identifier (IID), of the IPv6 address. Some implementations create the IID using t...
     
 1