Zum Hauptinhalt springen

Showing 1–7 of 7 results for author: Moore, T J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.10087  [pdf, ps, other

    cs.NI cs.LG eess.SP

    Decentralized Covert Routing in Heterogeneous Networks Using Reinforcement Learning

    Authors: Justin Kong, Terrence J. Moore, Fikadu T. Dagefu

    Abstract: This letter investigates covert routing communications in a heterogeneous network where a source transmits confidential data to a destination with the aid of relaying nodes where each transmitter judiciously chooses one modality among multiple communication modalities. We develop a novel reinforcement learning-based covert routing algorithm that finds a route from the source to the destination whe… ▽ More

    Submitted 31 January, 2024; originally announced February 2024.

  2. A Survey on Centrality Metrics and Their Implications in Network Resilience

    Authors: Zelin Wan, Yash Mahajan, Beom Woo Kang, Terrence J. Moore, Jin-Hee Cho

    Abstract: Centrality metrics have been used in various networks, such as communication, social, biological, geographic, or contact networks. In particular, they have been used in order to study and analyze targeted attack behaviors and investigated their effect on network resilience. Although a rich volume of centrality metrics has been developed for decades, a limited set of centrality metrics have been co… ▽ More

    Submitted 30 November, 2020; originally announced November 2020.

    Comments: Main paper: 36 pages, 2 figures. Appendix 23 pages,45 figures

  3. arXiv:2007.08688  [pdf, ps, other

    cs.CR

    Diversity-By-Design for Dependable and Secure Cyber-Physical Systems: A Survey

    Authors: Qisheng Zhang, Abdullah Zubair Mohammed, Zelin Wan, Jin-Hee Cho, Terrence J. Moore

    Abstract: Diversity-based security approaches have been studied for several decades since the 1970's. The concept of diversity-by-design emerged in the 1980's and, since then, diversity-based system design research has been explored to build more secure and dependable systems. In this work, we are particularly interested in providing an in-depth, comprehensive survey of existing diversity-based approaches,… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

  4. arXiv:2007.08469  [pdf, other

    cs.CR

    Vulnerability-Aware Resilient Networks: Software Diversity-based Network Adaptation

    Authors: Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore, Ing-Ray Chen

    Abstract: By leveraging the principle of software polyculture to ensure security in a network, we proposed a vulnerability-based software diversity metric to determine how a network topology can be adapted to minimize security vulnerability while maintaining maximum network connectivity. Our proposed software diversity-based adaptation (SDA) scheme estimates a node's software diversity based on the vulnerab… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

  5. arXiv:1909.08092  [pdf, other

    cs.NI cs.GT

    Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense

    Authors: Jin-Hee Cho, Dilli P. Sharma, Hooman Alavizadeh, Seunghyun Yoon, Noam Ben-Asher, Terrence J. Moore, Dong Seong Kim, Hyuk Lim, Frederica F. Nelson

    Abstract: Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades. However, the nature of reactive security mechanisms has limitations because potential attackers cannot be prevented in advance. We are facing a reality with the proliferation of persistent, advanced, intelligent attacks while defenders are ofte… ▽ More

    Submitted 12 September, 2019; originally announced September 2019.

    Comments: 36 pages, 15 figures

  6. arXiv:1807.09343  [pdf, other

    cs.NI

    FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks

    Authors: Dilli P. Sharma, Dong Seong Kim, Seunghyun Yoon, Hyuk Lim, Jin-Hee Cho, Terrence J. Moore

    Abstract: Network address shuffling is one of moving target defense (MTD) techniques that can invalidate the address information attackers have collected based on the current network IP configuration. We propose a software-defined networking-based MTD technique called Flexible Random Virtual IP Multiplexing, namely FRVM, which aims to defend against network reconnaissance and scanning attacks. FRVM enables… ▽ More

    Submitted 18 July, 2018; originally announced July 2018.

    Journal ref: IEEE TrustCom 2018

  7. arXiv:1710.01724  [pdf, other

    cs.SI physics.soc-ph

    An efficient alternative to Ollivier-Ricci curvature based on the Jaccard metric

    Authors: Siddharth Pal, Feng Yu, Terrence J. Moore, Ram Ramanathan, Amotz Bar-Noy, Ananthram Swami

    Abstract: We study Ollivier-Ricci curvature, a discrete version of Ricci curvature, which has gained popularity over the past several years and has found applications in diverse fields. However, the Ollivier-Ricci curvature requires an optimal mass transport problem to be solved, which can be computationally expensive for large networks. In view of this, we propose two alternative measures of curvature to O… ▽ More

    Submitted 4 October, 2017; originally announced October 2017.