ICIW 2011 Home
   Author Guidelines
   Call for Papers
   Mini-Tracks
   Abstract Submission
   Abstracts Selected
   Biographies
   Committee
   Programme
   Registration
   Practical Information
   Proceedings 2010
   ICIW Future
   ICIW Past
   Seminars
   Publishers
   Exhibitor Details
   Sponsorship Details
   About ACI
ICIW 2011
17-18 March, Washington, DC, USA
Home >> ICIW >> ICIW 2011 >> iciw10-proceedings
WWW ACI   At a glance Calendar RSS Feed Contact us

 

Proceedings of ICIW 2010
The 5th International Conference on Information-Warfare & Security
held at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA
Wright-Patterson Air Force Base, Ohio, USA
8-9 April 2010

 

 

The proceedings of the above conference are now available to purchase in two formats, Book or CD-ROM:

UK AND EUROPE: Cost, including post and packing is £60.00

REST OF THE WORLD: Cost, including post and packing is £65.00

Cost for CD is £50, including post and packing, to UK and  Europe and £55 to anywhere else in the world.


The Contents of the Proceedings are shown below.

If you would like to download and read the Abstracts of the papers presented at the Conference, please click here

To order the Proceedings, please click here

 

 

Paper Title

Author(s)

Page No.

Preface

 

vii

Biographies of Conference Chairs, Programme Chair, Keynote Speaker and Mini-track Chairs

 

ix

Biographies of contributing authors

 

xi

Mission Impact: Role of Protection of Information Systems

Evan Anderson1, Joobin Choobineh1, Michael Fazen1, and Michael Grimaila2
1
Texas A&M University, College Station, USA
2Air Force Institute of Technology, Wright Patterson AFB, USA

1

Operational art and Strategy in Cyberspace

Sam Arwood, Robert Mills and Richard Raines
Air Force Institute of Technology, Wright-Patterson AFB, USA

16

BotNet Communication in an Asymmetric Information Warfare Campaign

Curt Barnard and Barry Mullins
Air Force Institute of Technology, Wright-Patterson AFB, USA

23

Distributed Hierarchical Identity Management: a vision

Uri Blumenthal, Joshua Haines and Gerald O’Leary
MIT Lincoln Laboratory, Lexington, USA

28

Expanding Cyberspace Education and Training

Jeff Boleng and Michael Henson
US Air Force Academy, Colorado, USA

37

Investigation of Network Security Risks Inherent to IPv6

Julie Boxwell Ard
University of California, Davis, USA

44

Civilians in Information Warfare: Conscription of Telecom Networks and State Responsibility for International Cyber Defense

Susan Brenner1 and Maeve Dion2
1
University of Dayton School of Law, USA
2George Mason University School of Law, USA

49

Covert Channels in the HTTP Network Protocol: Channel Characterization and Detecting Man-in-the-Middle Attacks

Erik Brown, Bo Yuan, Daryl Johnson and Peter Lutz
Rochester Institute of Technology, Rochester, USA

56

Framework for Developing Realistic MANET Simulations

Ivan Burke1, Shahen Naidoo1 and Martin Olivier2
1
Council for Scientific and Industrial Research, Pretoria South Africa
2University of Pretoria, South Africa

65

Real-Time Detection of Distributed Zero-Day Attacks in ad hoc Networks

James Cannady
Nova Southeastern University, Fort Lauderdale, USA

72

Intelligence Activities in Greece and Rome: Extracting Lessons

Evan Dembskey
Tshwane University of Technology, South Africa

82

Simple Trust Protocol for Wired and Wireless SCADA Networks

Jose Fadul, Kenneth Hopkinson, Todd Andel, Stuart Kurkowski, James Moore
Air Force Institute of Technology, USA

89

Security in the Emerging African Broadband Environment

Bryon Fryer, Kris Merritt and Eric Trias
Air Force Institute of Technology (AFIT), Dayton, Ohio, USA

98

Critical Infrastructure Control Systems Vulnerabilities

Marchello Graddy and Dennis Strouble
Air Force Institute of Technology, Wright-Patterson AFB, USA

106

Legal Frameworks to Confront Cybercrime: a Global Academic Perspective

Virginia Greiman and Lou Chitkushev
Boston University, MA, USA

112

Communicating Potential Mission Impact Using Shared Mission Representations

Brian Hale1, Michael Grimaila1, Robert Mills1, Michael Haas1, and Phillip Maynard2
1
Air Force Institute of Technology, Wright Patterson AFB, USA
2Air Force Research Laboratory, Wright Patterson AFB, USA

120

Explosion of Connections

Harry Haury
NuParadigm Government Systems, Inc., Saint Louis, MO, USA

128

Information Asset Value Quantification Expanded

Denzil Hellesen1 and Michael Grimaila2
1
Air Force Network Integration Center (AFNIC), Scott AFB, USA
2Air Force Institute of Technology, Wright-Patterson AFB, USA

138

Pearl Harbor 2.0: When Cyber-Acts Lead to the Battlefield

Wayne Henry, Jacob Stange and Eric Trias
Air Force Institute of Technology, WPAFB, USA

148

Educating and Training Soldiers for Information Operations

Aki-Mauri Huhtinen1, Leigh Armistead2, 3 and Corey Schou3
1
Finnish National Defence University, Helsinki, Finland
2Goldbelt Hawk LLC, Hampton, USA
3Idaho State University, Pocatello, USA

155

Improving the Latent Dirichlet Allocation Document Model With WordNet

Laura Isaly, Eric Trias and Gilbert Peterson
Air Force Institute of Technology, Wright-Patterson AFB, USA

163

The Impact of the Increase in Broadband Access on South African National Security and the Average Citizen

Joey Jansen van Vuuren1, Jackie Phahlamohlaka 1 and Mario Brazzoli2
1Defence Peace Safety and Security: CSIR, Pretoria, South Africa
2
Government Information Technology Officer in the Defence Secretariat, Pretoria, South Africa

171

A Collaborative Process Based Risk Analysis for Information Security Management Systems

Bilge Karabacak1 and Sevgi Ozkan2
1
TUBITAK, Ankara, Turkey
2METU, Ankara, Turkey

182

Ensuring Communication Security in Delay-Tolerant Networks

Anssi Kärkkäinen
Defence Command Finland, Helsinki, Finland

193

From ABAC to ZBAC: The Evolution of Access Control Models

Alan Karp1, Harry Haury2 and Michael Davis3
1
Hewlett-Packard Laboratories, USA
2NuParadigm, USA
3SPAWAR, US Navy, USA

202

Malware Detection via a Graphics Processing Unit

Nicholas Kovach and Barry Mullins
Air Force Institute of Technology, Wright-Patterson AFB, USA

212

Digital Evidence Collection in Cyber Forensics Using Snort

Thrinadh Praveen Kumar1, Lalitha Bhaskari2, P. Avadhani2 and P. Vijaya Kumar3
1
GVP College of Engineering, Visakhapatnam, India
2AU College of Engineering, Visakhapatnam, India
3High Court of Andhra Pradesh, Hyderabad, India

216

Growth Through Uncertainty – the Secure e-Business Evolution of the Small Firm

John McCarthy, Alan Benjamin, Don Milne, Bryan Mills and Peter Wyer
Bucks New University, High Wycombe, UK
Derby University, UK

223

Hiding Appropriate Messages in the LSB of JPEG Images

Hamdy Morsy1, Ahmed Hussein1, Joshua Gluckman2 and Fathy Amer1
1
Faculty of Engineering at Helwan University, Cairo, Egypt
2American University in Cairo, Egypt

232

An Application of Deception in Cyberspace: Operating System Obfuscation

Sherry Murphy, Todd McDonald, and Robert Mills
Air Force Institute of Technology, Wright Patterson, USA

241

Insider Threat Detection Using Distributed Event Correlation of Web Server Logs

Justin Myers, Michael Grimaila, and Robert Mills
Air Force Institute of Technology, USA

251

Verify Then Trust: A New Perspective on Preventing Social Engineering

Kristopher Nagy, Brian Hale and Dennis Strouble
Air Force Institute of Technology, Wright-Patterson AFB, Ohio, USA

259

Cyberspace: Definition and Implications

Rain Ottis and Peeter Lorents
Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia

267

Transparent Emergency Data Destruction

Warren Roberts, Christopher Johnson and John Hale
University of Tulsa, USA

271

Cyber-Based Behavioral Fingerprinting

David Robinson and George Cybenko
Dartmouth College, Hanover, USA

279

Exploitation of Blue Team SATCOM and MILSAT Assets for red Team Covert Exploitation and Back-Channel Communications

David Rohret and Jonathan Holston
Joint Information Operations Warfare Center (JIOWC)/Joint Electronic Warfare Center (JEWC) San Antonio, USA

285

A Hybrid Approach to Teaching Information Warfare

Dino Schweitzer and Steve Fulton
United States Air Force Academy, USA

299

A Stochastic Game Model with Imperfect Information in Cyber Security

Sajjan Shiva, Sankardas Roy, Harkeerat Bedi, Dipankar Dasgupta and Qishi Wu
University of Memphis, USA

308

Malware Antimalware Games

Anshuman Singh, Arun Lakhotia and Andrew Walenstein
University of Louisiana at Lafayette, USA

319

Evaluating the Security of Enterprise VoIP Networks

Peter Thermos
Palindrome Technologies, USA

328

An FPGA-Based Malicious DNS Packet Detection Tool

Brennon Thomas and Barry Mullins
Air Force Institute of Technology, Wright-Patterson AFB, USA

337

Digital Forensics Detection and Disruption of JPEG Steganaography

George Trawick and Drew Hamilton
Auburn University, Auburn Alabama, USA

343

A High-Level Mapping of Cyberterrorism to the OODA Loop

Namosha Veerasamy
Council for Scientific and Industrial Research (CSIR), Pretoria, South Africa

352

An Adaptation Based Survivability Framework for Mission Critical Systems

Yanjun Zuo
University of North Dakota, Grand Forks, USA

361

Research in Progress Papers

 

 

A Blind Scheme Watermarking Algorithm for Data Hiding in RGB Images Using GÖdelization Technique Under Spatial Domain

Peri Avadhani and Lalitha Bhaskari
A U College of Engineering (A), Andhra Pradesh, India

373

Automatic Discovery of Attack Messages and Pre- and Post-Conditions for Attack Graph Generation

Marco Carvalho and Choh Man Teng
Institute for Human and Machine Cognition, Pensacola, USA

378

Mission Impact of Cyber Events: Scenarios and Ontology to Express the Relationships Between Cyber Assets, Missions and Users

Anita D’Amico1, Laurin Buchanan1, John Goodall1 and Paul Walczak2
1
Applied Visions, Inc., Secure Decisions Division, Northport, USA
2Warrior, LLC, Arlington, USA

388

An Investigation of Malware Type Classification

Thomas Dube1, Richard Raines1, Bert Peterson1, Kenneth Bauer1, Steven Rogers2
1
Air Force Institute of Technology, WPAFB, Ohio, USA

2Air Force Research Laboratory, WPAFB, Ohio, USA

398

Language-Driven Assurance for Regulatory Compliance of Control Systems

Robin Gandhi, William Mahoney, Ken Dick and Zachary Wilson
University of Nebraska at Omaha, USA

407

AIMFIRST: Planning for Mission Assurance

Tom Haigh, Steven Harp and Charles Payne
Adventium Enterprises, Minneapolis, USA

416

Moderating Roles of Organizational Capabilities Affecting Information Security Strategy Effectiveness: A Structural Equation Modeling Analysis

Jacqueline Hall, Shahram Sarkani, and Thomas Mazzuchi
The George Washington University, Washington, USA

427

Information Operations in Space, Absence of Space Sovereignty, Growing Number of Nations Looking Spaceward: Threats and Fears Concerning Established Space-based Military Powers

Berg Hyacinthe1 and Larry Fleurantin2
1
Assas School of Law― cersa-cnrs Sorbonne, France
2Fleurantin & Associates, Florida, USA

437

Evaluating the Impact of Cyber Attacks on Missions

Scott Musman, Aaron Temin, Mike Tanner, Dick Fox and Brian Pridemore
MITRE Corp, McLean, VA, USA

446

NEO Thinks EBO - a way to Shape Perceptions

Nuno Perry1 and Paulo Nunes1, 2
1
Competitive Intelligence and Information Warfare Association Club, Funchal, Portugal
2Centro de Investigação da Academia Militar, Lisbon, Portugal

459

Decision-Making by Effective Information Security Managers

James Pettigrew, Julie Ryan, Kyle Salous and Thomas Mazzuchi
George Washington University, Washington DC, USA

467

Security Monitoring and Attack Detection in Non-IP Based Systems

Steven Templeton
University of California, Davis, USA

475

Federating Enterprises Architectures Using Reference Models

Jeffery Wilson, Thomas Mazzuchi, and Shahram Sarkani
The George Washington University, Washington DC, USA

483

Practitioner Papers

 

 

The Weaponry and Strategies of Digital Conflict

Kevin Coleman
Security and Intelligence Center at the Technolytics Institute, USA

493

Security Assessment Techniques for Software Assurance – a “Virtual Team” Approach

Derek Isaacs
Boecore Inc. Colorado Springs USA

502

Asymmetrical Warfare: Challenges and Strategies for Countering Botnets

Gunter Ollmann
Damballa Inc, Atlanta, USA

509

Boundary Management and Integration Framework for a Joint Cyber Defence Capability for Military Forces: Analysis and Synthesis from a Through-Life Capability Management Perspective

Joey Roodt1, René Oosthuizen2 and Jan Jansen van Vuuren1
1
Defence Peace Safety and Security: CSIR, Pretoria, South Africa
2Monzé Consultants, Pretoria, South Africa

515

The Extremist Edition of Social Networking: The Inevitable Marriage of Cyber Jihad and Web 2.0

Dondi West and Christina Latham
Booz Allen Hamilton, Hanover, Maryland, USA

525

 

 

 

 

 

 

 

Updated 29 July 2010

 

Academic Conferences Limited - Curtis Farm, Kidmore End, Nr Reading, RG4 9AY, England - Tel: +44 (0)1189 724148 - Fax: +44 (0)1189 724691
eMail: info@academic-conferences.org- Copyright 2010 Academic Conferences Limited - registered in England - No: 4719488 - VAT No: 812 5366 38
Terms & Conditions                                             Privacy Policy