Alden W. Jackson
BBN Technologies
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Alden W. Jackson.
ACM Transactions on Computer Systems | 2000
Beverly Schwartz; Alden W. Jackson; W. Timothy Strayer; Wenyi Zhou; R. Dennis Rockwell; Craig Partridge
This article introduces Smart Packets and describes the smart Packets architecture, the packet formats, the language and its design goals, and security considerations. Smart Packets is an Active Networks project focusing on applying active networks technology to network management and monitoring. Messages in active networks are programs that are executed at nodes on the path to one or more target hosts. Smart Packets programs are written in a tightly encoded, safe language specifically designed to support network management and avoid dangerous constructs and accesses. Smart Packets improves the management of large complex networks by (1) moving management decision points closer to the node being managed, (2) targeting specific aspects of the node for information rather than exhaustive collection via polling, and (3) abstracting the management concepts to language constructs, allowing nimble network control.
Proceedings DARPA Active Networks Conference and Exposition | 2002
Alden W. Jackson; James P. G. Sterbenz; Matthew Condell; Regina Rosales Hain
We present the architecture, design, and implementation of SENCOMM (smart environment for network control, monitoring and management). SENCOMM uses active network technology to comprise a management execution environment (SMEE), which coexists with other execution environments (EEs). Management applications, called smart probes, run in the SMEE. A probe and its data are mobile executable code that are delivered to the active node within an active network encapsulation protocol (ANEP) datagram. Our architecture is designed to actively control, monitor, and manage both conventional and active networks, and be incrementally deployed in existing networks. We present a set of goals, a design philosophy, and a set of basic requirements for controlling, monitoring, and managing networks using the active network technology. We discuss the operation and components of SENCOMM:. the management EE, a protocol, smart probes, and loadable libraries. We discuss the implementation issues uncovered in integrating SENCOMM into a selected EE and the decisions made to resolve them.
2009 Cybersecurity Applications & Technology Conference for Homeland Security | 2009
Alden W. Jackson; David Lapsley; Christine E. Jones; Mudge Zatko; Chaos Golubitsky; W. Timothy Strayer
There is an urgent need for a pro-active approach to botnet detection and mitigation that will enable computer network defenders to characterize emerging and future botnet threats and design effective defense techniques before these threats materialize. To this end, we have developed a System for Live Investigation of Next Generation bots (SLINGbot). SLINGbot is an extensible, composable bot framework that enables researchers to construct benign bots for the purposes of generating and characterizing botnet Command and Control (C2) traffic. This enables researchers to simulate current and potential future botnet traffic, characterize it, and design effective defense techniques. In this paper, we describe the SLINGbot system and how it can be used for the pro-active development of botnet defenses.
local computer networks | 2015
Daniel Ellard; Christine E. Jones; Victoria Ursula Manfredi; W. Timothy Strayer; Bishal Thapa; Megan Van Welie; Alden W. Jackson
Decoy routing is a powerful circumvention mechanism intended to provide secure communications that cannot be monitored, detected, or disrupted by a third party who controls the users network infrastructure. Current decoy routing protocols have weaknesses, however: they either make the unrealistic assumption that routes through the network are symmetric (i.e., the router implementing the decoy routing protocol must see all of the traffic, in both directions, from each connection it modifies), or their protocol requires modifying the route taken by packets in connections that use the protocol, and these route changes are detectable by a third party. We present Rebound, a decoy routing protocol that tolerates asymmetric routes without modifying the route taken by any packet that passes through the decoy router, making it more difficult to detect or disrupt than previous decoy routing protocols.
military communications conference | 2009
Kristin Rauschenbach; Regina Rosales Hain; Alden W. Jackson; John Jacob; Will Leland; John Lowry; Walter Clark Milliken; Partha P. Pal; Ram Ramanathan; Cesar A. Santivanez; Ilia Baldine; Shu Huang; Daniel M. Wood
We describe the architecture of PHAROS (Petabit Highly-Agile Robust Optical System), developed under the DARPA CORONET program. PHAROS provides traffic engineering, resource management and signaling solutions for highly-agile, large-capacity core optical networks. PHAROS technology facilitates rapid configuration of network resources to address dynamic traffic needs in future global military and commercial communications, such as localized surges in capacity requirements that result from military operations. PHAROS technology also scales to support bandwidth-intensive, network-centric, collaborative and distributed computing applications, and accommodates the continued growth of video and biometric data services.
international conference on photonics in switching | 2009
Kristin Rauschenbach; Regina Rosales Hain; Alden W. Jackson; John Jacob; Will Leland; John Lowry; W. Miliken; Partha P. Pal; Ram Ramanathan; Cesar A. Santivanez; I. Baldine; S. Huang; D. Wood
DARPAs CORONET PHAROS (Petabit Highly-Agile Robust Optical System) provides traffic engineering algorithms and signaling solutions for highly-agile, large-capacity core optical networks. PHAROS technology will facilitate rapid configuration of network resources to address dynamic traffic needs in future global communications, such as localized surges in capacity requirements that result from flash-crowds and smooth recovery from multiple concurrent network faults. PHAROS technology is designed to scale to support bandwidth-intensive collaborative and distributed computing applications, and accommodates the continued growth of video services.
ACM Transactions on Computer Systems | 2000
Beverly Schwartz; Wenyi Zhou; Alden W. Jackson; W. Timothy Strayer; D. Rockwell; Craig Partridge
acm/ieee international conference on mobile computing and networking | 2002
Craig Partridge; David Bruce Cousins; Alden W. Jackson; Rajesh Krishnan; Tushar Saxena; W. Timothy Strayer
foundations of computational intelligence | 2011
Josh Karlin; Daniel Ellard; Alden W. Jackson; Christine E. Jones; Greg Lauer; David Patrick Mankins; W. Timothy Strayer
RFC | 1999
Craig Partridge; Alden W. Jackson