ICIW 2007 2Nd International Conference on I- Warfare and Security Naval Postgraduate School, Monterey, California, USA
Total Page:16
File Type:pdf, Size:1020Kb
ICIW 2007 2nd International Conference on i- Warfare and Security Naval Postgraduate School, Monterey, California, USA 8-9 March 2007 Edited by Leigh Armistead Edith Cowan University Copyright The Authors, 2007. All Rights Reserved. No reproduction, copy or transmission may be made without written permission from the individual authors. Papers have been double-blind peer reviewed before final submission to the conference. Initially, paper abstracts were read and selected by the conference panel for submission as possible papers for the conference. Many thanks to the reviewers who helped ensure the quality of the full papers. ISBN: 978-1-905305-41-4 Published by Academic Conferences Limited Reading UK 44-118-972-4148 [email protected] ICIW 2007 Contents Proceedings Paper Title Author(s) Page Preface iv Biographies of Conference Chairs, Programme Chair, Keynote Speaker and vi Mini-track Chairs Biographies of contributing authors viii Edwin Leigh Armistead1 and The Evolution of Information Operations, Thomas Murphy2 Contracts across the DoD: Opportunities for 1Edith Cowan University, Australia 1-8 Growth in the Future for Academics 2Northlight Technologies, USA Sviatoslav Braynov On Manipulability of Algorithms University of Illinois at Springfield 9-16 IL USA Developing a Framework to Improve Adam Bryant and Michael Grimaila Information Assurance Battlespace Air Force Institute of Technology, 17-24 Knowledge Fairborn, OH, USA Scott Bryant and Michael Grimaila Security Risks in USAF Geospatial Air Force Institute of Technology 25-32 Information Sharing Fairborn, OH, USA Performance Impact of Connectivity James Cullum, Cynthia Irvine and Restrictions and Increased Vulnerability Tim Levin 33-46 Presence on Automated Attack Graph Naval Postgraduate School, Generation Monterey, CA, USA Kenneth Edge, Richard Raines, Rusty Baldwin, Michael Grimaila, Analyzing Security Measures for Mobile Ad Christopher Reuter and Robert Hoc Networks Using Attack and Protection Bennington 47-56 Trees Wright-Patterson AFB, Fairborn,Oh, USA Sid Faber1and Bert Lundy2 1Software Engineering Institute, A Study of DNS Traffic Patterns on a Large Pittsburgh, PA, USA 57-68 Autonomous System 2Naval Postgraduate School, Monterey, CA, USA Larry Fortson and Michael Grimaila Development of a Defensive Cyber Damage Air Force Institute of Technology, 69-76 Assessment Framework Fairborn, OH, USA Simson Garfinkel Anti-Forensics: Techniques, Detection and Naval Postgraduate School, 77-84 Countermeasures Monterey, CA, USA Kenneth Geers and Alexander Eisen IPv6: World Update NCIS Washington, DC, USA 85-94 Leap in the Dark: An Attempt to Theorize Shuyuan Mary Ho Personnel Anomaly Detection for Countering Syracuse University, NY, USA 95-100 Insider Threats i Proceedings Paper Title Author(s) Page Berg Hyacinthe1 and Yves Anglade2 Conceptual Design of a Microfluidics 1Florida State University, Suppressor to Protect against Potentially Tallahassee, FL, USA 101-110 Lethal Printing Devices: A Scenario-based 2Florida A&M University, Physical Cyber Security Measure Tallahassee, FL, USA Derek Isaacs ‘Virtual’ Security Teaching Techniques – Colorado Technical University, and 111-116 Teaching IA methods using VMWare Teams Boecore Inc, Colorado Springs CO, USA Keisuke Iwai, Minoru Sasaki and Differential Power Analysis Attacks against Takakazu Kurokawa 117-122 AES Circuits Implemented on a FPGA National Defense Academy, Japan Magdi Kamel, Mark Eramo, and Categorization of Profiles for PSYOPs: Can Christopher Sutter 123-132 Technology Help? Naval Postgraduate School, Monterey, CA, USA Tuija Kuusisto1, Rauno Kuusisto2 and Mark Nissen3 1Ministry of Defence, Helsinki, Implications of Information Flow Priorities for Finland 2 133-140 Interorganizational Crisis Management National Defence University, Helsinki, Finland 3Naval Postgraduate School, Monterey, CA, USA Irving Lachow and Robert Miller Thinking Strategically About Information National Defense University, 141-146 Operations Washington, DC, USA William Mahoney and William Intrusion Detection in open Source Software Sousan 147-154 via Dynamic Aspects University of Nebraska at Omaha, NE, USA Fine-Grain Security for Military-Civilian- R William Maule and Shelley Gallup Coalition Operations Though Virtual Private Naval Postgraduate School, 155-162 Workspace Technology Monterey, CA, USA Creating Hardware-based Primitives that Stephen Mott and Paul Williams Facilitate the Exposure of State Information Air Force Institute of Technology, 163-170 Useful for Security Related Monitoring Fairborn, OH, USA Ken Revett1, Sergio Tenreiro de Magalhaes2 and Henrique Santos2 Graphical Based user Authentication with 1 University of Westminster, 171-176 Embedded Mouse Stroke Dynamics London,Uk 2University do Minho, Portugal Neil Rowe Planning Cost-Effective Deceptive Resource U.S. Naval Postgraduate School, 177-184 Denial in Defense to Cyber-Attacks CA, USA Neil Rowe, Han Goh, Sze Lim, and Experiments with a Testbed for Automated Binh Duong Defensive Deception Planning for Cyber- U.S. Naval Postgraduate School, 185-194 Attacks CA, USA Robert Sainsbury and Richard Possible Risks Analysis Engine: A Prototype Baskerville Tool for Managing IT Security Safeguards Georgia State University, Atlanta, 195-204 Acquisition GA, USA ii Minoru Sasaki, Keisuke Iwai and Modified RSL as a Countermeasure Against Takakazu Kurokawa 205-216 Differential Power Analysis National Defense Academy, Japan Tiffiny Smith1, Pamela Woolley2, 1 1 A Framework for Relating Cyberspace Robert Mills , and Richard Raines 1 Operations to the Cognitive and Physical Air Force Institute of Technology, 217-224 Domains Fairborn, OH, USA 2 Fairchild AFB WA, USA Anthonius Sulaiman, Sandeep Mandada, Srinivas Mukkamala and Similarity Analysis of Malicious Executables Andrew Sung 225-232 New Mexico Tech, Socorro,NM, USA Stilianos Vidalis, Eric Llewellyn and Using Deception for assuring Security Chrostopher Tubbs 233-240 University of Wales, Newport ,UK Andrew Walenstein1, Rachit Mathur2, Mohamed Chouchane1, and Arun Lakhotia1 1 The Design Space of Metamorphic Malware University of Louisiana at Lafayette, 241-248 LA, U.S.A. 2McAfee Avert Labs, Beaverton, OR, U.S.A. Ken Webb Information Terrorism in the New Security RNSA and Edith Cowan University, 249-256 Environment Perth, Western Australia Bill Woodcock1 and Ross Stapleton- Gray2 Inter-Network Operations Center Dial-By- 1Packet Clearing House, Berkeley, ASN (INOC-DBA), a Hotline for Critical CA, USA 257-262 Internet Infrastructure Management 2Internet Awareness, Inc., Berkeley, CA, USA Don Milne1, John McCarthy2,and Bryan Mills2 1Buckinghamshire Chilterns SME Security in the Digital age University College, High Wycombe, 263-270 UK 2Service Tec Global Services Ltd, UK iii Preface Welcome to the Second International Conference on Information Warfare and Security (ICIW 2007), hosted this year by the Naval Postgraduate School in Monterey, California. The Conference Chair is Dr Dorothy Denning from the Naval Postgraduate School and the Programme Chair is Leigh Armistead from Edith Cowan University in Perth, Australia. The main aim of this Conference is for individuals working in the area of Information Warfare and Information Security to come together to share knowledge with peers interested in the same area of study. The opening keynote address this year is given by Tim Thomas, Foreign Military Studies Office, Army Command and Staff College, Fort Leavenworth, USA on the topic of “Decoding the Virtual Dragon”. On day two of the conference the keynote speaker is John Arquilla from the Naval Postgraduate School, who will talk on “Information Warfare Today”. An important benefit of attending this conference is the ability to share ideas and meet the people who hold them. The range of papers will ensure an interesting two days. The topics covered by the papers this year illustrate the depth of the information operations’ research area, with the subject matter ranging from the highly technical to the more strategic visions of the use and influence of information. To further enhance the conference experience Leigh Armistead will lead an interactive session encouraging debate and discussion the current status of research in the I-Warfare and Security area. With an initial submission of 60 abstracts, after the double blind, peer review process there are 33 papers published in these Conference Proceedings. These papers illustrate the true International spread of the conference, coming from Australia, Finland, Japan, United Kingdom, United States. I wish you a most enjoyable conference. Leigh Armistead Edith Cowan University Programme Chair iv Conference Executive: Edwin Leigh Armistead, Edith Cowan University, Australia Sviatoslav Braynov University of Illinois at Springfield, IL, USA Dorothy Denning, Naval Postgraduate School, Monterey, CA, USA Steve Iatrou, Naval Postgraduate College, Monterey, CA, USA Andy Jones, Security Research Centre, BT, UK and Edith Cowan University, Australia Dan Kuehl, National Defense University, Washington DC, UK, Tara Leweling, Naval Postgraduate School, Monterey, CA, USA Corey Schou, Idaho State University, USA Stylianos Vidalis, University of Glamorgan, UK Conference Committee: The conference programme committee consists of key people in the information systems, information warfare and information security communities around the world. The following people have confirmed their participation: Leigh Armistead (Edith Cowan University, Australia); John Arquila (Naval Postgraduate School, USA); Richard Baskerville (Georgia