Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Grant A. Jacoby is active.

Publication


Featured researches published by Grant A. Jacoby.


global communications conference | 2004

Battery-based intrusion detection

Grant A. Jacoby; Nathaniel J. Davis

This paper proposes an early warning system via a host-based form of intrusion detection that can alert security administrators to protect their corporate network(s). This innovative technique operates through the implementation of battery-based intrusion detection (B-bid) on mobile devices by correlating attacks with their impact on device power consumption using a rules-based host intrusion detection engine (HIDE). HIDE monitors power behavior to detect potential intrusions by noting irregularities of power consumption.


Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004. | 2004

Battery-based intrusion detection a first line of defense

Grant A. Jacoby; Randy C. Marchany; Nathaniel J. Davis

This paper proposes a first line of defense early warning system via a host-based form of intrusion detection that can alert security administrators to protect their corporate network(s). This innovative technique operates through the implementation of battery-based intrusion detection (B-bid) on mobile devices by correlating attacks with their impact on device power consumption using a rule-based host intrusion detection engine (HIDE). HIDE monitors power behavior to detect potential intrusions by noting irregularities of power consumption and works in conjunction with a host analysis signature trace engine (HASTE) to provide protection to both mobile hosts and, by extension, their affiliated network.


IEEE Wireless Communications | 2007

Mobile Host-Based intrusion Detection and Attack Identification

Grant A. Jacoby; Nathaniel J. Davis

Although much attention has focused on optimizing power in batteries for mobile devices, little attention to date has focused on battery constraints to determine if an attack is present. This research proposes that resident monitoring of the demands placed on a batterys current (mA) and other system processes can be used as an early-warning, trip-wire-like sensor for mobile hosts as a means to block attacks as well as to identify them.


ieee symposium on security and privacy | 2006

Using Battery Constraints within Mobile Hosts to Improve Network Security

Grant A. Jacoby; Randy C. Marchany; Nathaniel J. Davis

Distributed battery-based intrusion detection (B-BID) is an efficacious early-warning system that can complement existing intrusion detection systems (IDSs) by alerting users to protect their mobile devices as well as network administrators to protect their corporate networks by correlating device power consumption with application and attack activity data


It Professional | 2005

Intranet portal model and metrics: a strategic management perspective

Grant A. Jacoby; Luqi

Although many corporations store a great deal of information in their corporate intranets, few have a reliable means of measuring the effectiveness of their intranet portals to use this information to meet specific business needs. Turning information into knowledge capital that corporations can leverage quickly for competitive advantage requires a model and supporting metrics. Most intranet portal measurements are based almost exclusively on usage statistics - with little or no thought given to design or user experience - and corporations apply them in a nonstandardized manner, providing no meaningful insight into how well intranets help corporations achieve their strategic objectives. What has been missing is a comprehensive model and methodology to base measurements on logically related groups of metrics, which, when measured periodically, provide actionable steps to optimize the efficiency and effectiveness of intranet portals.


Communications of The ACM | 2007

Intranet model and metrics

Grant A. Jacoby; Luqi

Measuring intranet overall value contributions based on a corporations critical business requirements.


consumer communications and networking conference | 2007

Effective Reporting (ER) for Mobile Host-Based Security and Forensics

Grant A. Jacoby; J. Scot Ransbottom

A mobile devices intrusion protection system (IPS) is at odds with itself: it should run as often as necessary and remain transparent to the system and the users; however, it should use as little system resources as possible to detect, report and prevent intrusions. By creating a forensics report that regularly monitors demands placed on battery current (mA) as well as correlating power and event activities, such as processes, open ports, and registry keys, a mobile host-based form of intrusion protection can be easily integrated into virtually any network intrusion detection system (IDS.) This paper outlines a novel design, test and build methodology to generate an effective security profile and an efficient bit-vector reporting format, to provide an enhancement in detecting, alerting and responding to various misuse conditions.


military communications conference | 2006

Monitoring Mobile Device Vitals for Effective Reporting (ER)

J. Ransbottom; Grant A. Jacoby

This paper outlines how to proactively screen the health of a corporate network and perform first aid by systematically monitoring vital signs of mobile devices within the network. The first contribution is the set of vital signs consisting of event activities such as registry content changes, active processes, open ports, power usage thresholds, and power signatures (using the Battery-based intrusion detection system) to detect and prevent system intrusions. These vital signs are periodically reported back to a monitor using agents we designed for effective reporting (ER). These ER agents are installed in hosts and routers throughout the network. To minimize communications overhead, we achieve a size reduction of the raw, XML health reports by over 98% in a short-list, delta-set update. As a result, a 1.07 MB update was reduced to only 3,756 B. These updates are received by the ER monitor(s) and analyzed using existing intrusion detection and prevention systems providing a means to diagnose and isolate potential health hazards within the network that are not perceptible to individual devices


canadian conference on electrical and computer engineering | 2008

Towards command and control networking of cooperative autonomous robotics for military applications (CARMA)

Grant A. Jacoby; David Chang

This research focuses on the development of a network of cooperative autonomous robotics for military applications (CARMA) that work together to search, track, carry, deploy and retrieve sensor and other small payloads for a variety of purposes. CARMA addresses how the distributed hierarchical structure employed by the military is ideally suited as an efficient and robust model for distributed cooperative robotics that reduces the operator-to-robot ratio, which until now has been mostly biologically-inspired.


SAE transactions | 2004

Battery-Based Intrusion Detection: A Focus on Power for Security Assurance

Grant A. Jacoby; Nathaniel J. Davis

An intrusion detection system (IDS) for mobile devices is at odds with itself: IDS should run continuously and remain transparent to the system and the user(s); however, the IDS should use as little system resources as possible to detect and prevent intrusions. This paper proposes an efficacious early warning system via a mobile host-based form of intrusion detection that can alert security administrators to protect their corporate network(s). This innovative technique operates through the implementation of battery-based intrusion detection (B-bid) on mobile devices by correlating attacks with their impact on device power consumption using a rules-based host intrusion detection engine (HIDE). HIDE monitors power behavior to detect potential intrusions by noting irregularities of power consumption and works in conjunction with a scan port intrusion engine (SPIE) and a host analysis signature trace engine (HASTE) to provide protection to both mobile hosts and, by extension, their affiliated network(s).

Collaboration


Dive into the Grant A. Jacoby's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

David Chang

United States Military Academy

View shared research outputs
Top Co-Authors

Avatar

Luqi

Naval Postgraduate School

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Shawn Mosley

United States Military Academy

View shared research outputs
Top Co-Authors

Avatar

J. Ransbottom

United States Military Academy

View shared research outputs
Top Co-Authors

Avatar

Maxwell Potasznik

United States Military Academy

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Thadeus Hickman

United States Military Academy

View shared research outputs
Top Co-Authors

Avatar

Aaron Darensburg

United States Military Academy

View shared research outputs
Researchain Logo
Decentralizing Knowledge