Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Barry E. Mullins is active.

Publication


Featured researches published by Barry E. Mullins.


Proceedings of the 2007 workshop on Experimental computer science | 2007

An analysis of XML compression efficiency

Christopher J. Augeri; Dursun A. Bulutoglu; Barry E. Mullins; Rusty O. Baldwin; Leemon C. Baird

XML simplifies data exchange among heterogeneous computers, but it is notoriously verbose and has spawned the development of many XML-specific compressors and binary formats. We present an XML test corpus and a combined efficiency metric integrating compression ratio and execution speed. We use this corpus and linear regression to assess 14 general-purpose and XML-specific compressors relative to the proposed metric. We also identify key factors when selecting a compressor. Our results show, XMill or WBXML may be useful in some instances, but a general-purpose compressor is often the best choice.


adaptive hardware and systems | 2007

Using Relocatable Bitstreams for Fault Tolerance

David P. Montminy; Rusty O. Baldwin; Paul D. Williams; Barry E. Mullins

The regular structure and addressing scheme for the Virtex-IIfamily of field programmable gate arrays (FPGAs) allows the relocation of partial bitstreams through direct bitstream manipulation. Our bitstream translation program relocates modules on an FPGA by changing the partial bitstream of the module. To take advantage of relocatable modules, three fault tolerant circuit designs are developed and tested. While operating through a fault, these designs provide support for efficient and transparent replacement of the faulty module with a relocated fault-free module. The architecture of the FPGA and static logic significantly constrain the placement of relocatable modules, especially when a microprocessor is placed on the FPGA.


International Journal of Critical Infrastructure Protection | 2014

Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices

Roland Bodenheim; Jonathan Butts; Stephen Dunlap; Barry E. Mullins

Abstract The Shodan computer search engine has received significant attention due to its ability to identify and index Internet-facing industrial control system components. Industrial control systems are employed in numerous critical infrastructure assets, including oil and gas pipelines, water distribution systems, electrical power grids, nuclear plants and manufacturing facilities. The ability of malicious actors to identify industrial control devices that are accessible over the Internet is cause for alarm. Indeed, Shodan provides attackers with a powerful reconnaissance tool for targeting industrial control systems. This paper investigates the functionality of the Shodan computer search engine. In the experiments, four Allen-Bradley ControlLogix programmable logic controllers were deployed in an Internet-facing configuration to evaluate the indexing and querying capabilities of Shodan: all four programmable logic controllers were indexed and identified by Shodan within 19 days. This paper also describes a potential mitigation strategy that employs service banner manipulation to limit the exposure to Shodan queries.


intelligent robots and systems | 2003

Toward finding an universal search algorithm for swarm robots

Daniel J. Pack; Barry E. Mullins

We present a novel cooperative search algorithm for distributed, independent swarm robots. The focus of this paper is three fold: (1) identify fundamental issues associated with searching an area by multiple robots; (2) design a metric to measure the cooperation among multiple robots to complete a search; and (3) propose an effective search algorithm for swarm robots.


ieee symposium on security and privacy | 2007

How the Cyber Defense Exercise Shaped an Information-Assurance Curriculum

Barry E. Mullins; Timothy H. Lacey; Robert F. Mills; Joseph E. Trechter; Samuel D. Bass

In this article, we provide a brief history of the Cyber Defense Exercise (CDX), describe Air Force Institute of Technology (AFITs) participation in it, and explain how the experience shaped the information-assurance curriculum and course format at AFIT. The CDX is an annual competition designed to give students the opportunity to learn and demonstrate best practices in defensive information assurance. The CDXs fundamental objective is to design and implement a network that provides specified IT services and defend it against an onslaught of cyberattacks and natural events. CDX participants included blue forces (students), red forces (attacker) and a white cell.


International Journal of Security and Networks | 2007

Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks

Kevin M. Finnigin; Barry E. Mullins; Richard A. Raines; Henry Potoczny

We present a brute-force attack on an elliptic curve cryptosystem implemented on UC Berkleys TinyOS operating system for Wireless Sensor Networks (WSNs). The attack exploits the short period of the Pseudorandom Number Generator (PRNG) used by the cryptosystem to generate private keys. In order to define failure in the event a brute-force attack takes too long to execute, we create a metric that relates the duty cycle of the mote to the compromise rate and the period of the key generation algorithm. Experimental results show that roughly 50% of the motes address space leads to a private key compromise in 25 min on average. Furthermore, approximately 32% of the mote address space leads to a compromise in 17 min on average, 11% in 6 min and the remaining 7% in 2 min or less. We examine two alternatives to the PRNG our own design modified from a published algorithm and the new PRNG distributed with the beta release of TinyOS 2.0. Our design executes 12.47 times faster than the other alternative and requires 50 CPU cycles more than the original PRNG. In addition, our design is 6.3 times smaller than the other alternative and requires 106 additional bytes of memory. The period of our PRNG is uniform for all mote addresses and requires 6.6 years on average for a key compromise with the attack presented in this paper.


computer and communications security | 2008

A survey of state-of-the-art in anonymity metrics

Douglas J. Kelly; Richard A. Raines; Michael R. Grimaila; Rusty O. Baldwin; Barry E. Mullins

Anonymization enables organizations to protect their data and systems from a diverse set of attacks and preserve privacy; however, in the area of anonymized network data, few, if any, are able to precisely quantify how anonymized their information is for any particular dataset. Indeed, recent research indicates that many anonymization techniques leak some information. An ability to confidently measure this information leakage and any changes in anonymity levels plays a crucial role in facilitating the free-flow of cross-organizational network data sharing and promoting wider adoption of anonyimzation techniques. Fortunately, multiple methods of analyzing anonymity exist. Typical approaches use simple quantifications and probabilistic models; however, to the best of our knowledge, only one network data anonymization metric has been proposed. More importantly, no one-stop-shop paper exists that comprehensively surveys this area for other candidate measures; therefore, this paper explores the state-of-the-art of anonymity metrics. The objective is to provide a macro-level view of the systematic analysis of anonymity preservation, degradation, or elimination for data anonymization as well as network communciations anonymization.


ieee symposium on security and privacy | 2006

Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion

David J. Chaboya; Richard A. Raines; Rusty O. Baldwin; Barry E. Mullins

In this article, the authors describe common intrusion detection techniques, NIDS evasion methods, and how NIDSs detect intrusions. Additionally, the authors introduce new evasion methods, present test results for confirming attack outcomes based on server responses, and propose a methodology for confirming response validity


information assurance and security | 2007

Program Fragmentation as a Metamorphic Software Protection

Bobby D. Birrer; Richard A. Raines; Rusty O. Baldwin; Barry E. Mullins; Robert W. Bennington

This paper proposes a Distributed Intrusion Prevention System (DIPS), which consists of several IPS over a large network (s), all of which communicate with each other or with a central server, that facilitates advanced network monitoring. A Hidden Markov Model is proposed for sensing intrusions in a distributed environment and to make a one step ahead prediction against possible serious intrusions. DIPS is activated based on the predicted threat level and risk assessment of the protected assets. Intrusions attempts are blocked based on (1) a serious attack that has already occurred (2) rate of packet flow (3) prediction of possible serious intrusions and (4) online risk assessment of the assets possibly available to the intruder. The focus of this paper is on the distributed monitoring of intrusion attempts, the one step ahead prediction of such attempts and online risk assessment using fuzzy inference systems. Preliminary experiment results indicate that the proposed framework is efficient for real time distributed intrusion monitoring and prevention.


ieee international conference on pervasive computing and communications | 2009

A novel communications protocol using geographic routing for swarming UAVs performing a Search Mission

Robert L. Lidowski; Barry E. Mullins; Rusty O. Baldwin

This paper develops a novel communications protocol for autonomous swarms of unmanned aerial vehicles (UAVs) searching a 2-dimensional grid. The search protocol, the UAV Search Mission Protocol (USMP), combines inter-UAV communication with geographic routing to improve search efficiency in terms of total searches, distance traveled by UAVs, and the minimization of UAV direction changes. By determining where search state updates impact search decisions, messages are geographically routed to improve search efficiency. USMP and the geographic greedy perimeter stateless routing (GPSR) protocol are studied via simulation using OPNET Modeler 12.0. Geographic routing degrades performance by at least 20% in total searches and distance traveled, but improves direction changes by 6.7%. Overall, USMP improves performance by as much as 188% compared to scenarios without inter-UAV communication.

Collaboration


Dive into the Barry E. Mullins's collaboration.

Top Co-Authors

Avatar

Rusty O. Baldwin

Air Force Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Richard A. Raines

Air Force Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Benjamin W. P. Ramsey

Air Force Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Robert F. Mills

Air Force Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Michael R. Grimaila

Air Force Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Gilbert L. Peterson

Air Force Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Daniel J. Pack

University of Tennessee at Chattanooga

View shared research outputs
Top Co-Authors

Avatar

Douglas J. Kelly

Air Force Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Mason Rice

Air Force Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Christopher J. Augeri

Air Force Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge