Defense in depth added to Malicious Activities Simulation Tools (MAST)
Download
Author
Farber, Adam M.
Rawls, Robert A.
Date
2015-09Advisor
Singh, Gurminder
Gibson, John
Metadata
Show full item recordAbstract
With its ever-increasing reliance upon computers and networks in all facets of operation and administration, the U.S. military is becoming increasingly vulnerable to computer and network-based threats. Military technicians’ ability to prevent and mitigate these threats is a skill that must be learned and practiced; for this reason, the Malicious Activities Simulation Tool (MAST) was created. The ongoing training required to defend networks and ensure DOD network policies are implemented correctly is costly and time consuming. A solution was needed to facilitate training system operators and administrators in potentially inauspicious environments, and to be adaptable to emerging threats. Since the proposed solution is on local systems with communication traveling over untrusted networks, a defense in depth plan ensures no undue consequences occur during MAST use.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Cyber System Assurance through Improved Network Anomaly Modeling and Detection
Bollmann, Chad A. (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N039-AThe objectives of this work were to investigate the source of the dual natures of network traffic (i.e., Gaussian and alpha-stable) in order prove the merit of further development, improvement, and application of non-parametric ... -
Cyber System Assurance through Improved Network Anomaly Modeling and Detection
Bollmann, Chad A. (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N039-AThe objectives of this work were to investigate the source of the dual natures of network traffic (i.e., Gaussian and alpha-stable) in order prove the merit of further development, improvement, and application of non-parametric ... -
Demand Assigned Channel Allocation Applied to Full Duplex Underwater Acoustic Networking
Gibson, J.; Kaminski, A.; Xie, Geoffrey (2005-06);Acoustic communications provide a viable means for underwater networking. However, extreme propagation delays, limited bandwidth, and half duplex communications, with its inherent use of delay inducing collision avoidance ...