Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Linda Briesemeister is active.

Publication


Featured researches published by Linda Briesemeister.


computer and communications security | 2012

StegoTorus: a camouflage proxy for the Tor anonymity system

Zachary Weinberg; Jeffrey Wang; Vinod Yegneswaran; Linda Briesemeister; Steven Cheung; Frank Wang; Dan Boneh

Internet censorship by governments is an increasingly common practice worldwide. Internet users and censors are locked in an arms race: as users find ways to evade censorship schemes, the censors develop countermeasures for the evasion tactics. One of the most popular and effective circumvention tools, Tor, must regularly adjust its network traffic signature to remain usable. We present StegoTorus, a tool that comprehensively disguises Tor from protocol analysis. To foil analysis of packet contents, Tors traffic is steganographed to resemble an innocuous cover protocol, such as HTTP. To foil analysis at the transport level, the Tor circuit is distributed over many shorter-lived connections with per-packet characteristics that mimic cover-protocol traffic. Our evaluation demonstrates that StegoTorus improves the resilience of Tor to fingerprinting attacks and delivers usable performance.


workshop on rapid malcode | 2003

Epidemic profiles and defense of scale-free networks

Linda Briesemeister; Patrick Lincoln; Phillip A. Porras

In this paper, we study the defensibility of large scale-free networks against malicious rapidly self-propagating code such as worms and viruses. We develop a framework to investigate the profiles of such code as it infects a large network. Based on these profiles and large-scale network percolation studies, we investigate features of networks that render them more or less defensible against worms. However, we wish to preserve mission-relevant features of the network, such as basic connectivity and resilience to normal nonmalicious outages. We aim to develop methods to help design networks that preserve critical functionality and enable more effective defenses.


workshop on rapid malcode | 2004

A hybrid quarantine defense

Phillip A. Porras; Linda Briesemeister; Keith Skinner; Karl N. Levitt; Jeff Rowe; Yu-Cheng Allen Ting

We study the strengths, weaknesses, and potential synergies of two complementary worm quarantine defense strategies under various worm attack profiles. We observe their abilities to delay or suppress infection growth rates under two propagation techniques and three scan rates, and explore the potential synergies in combining these two complementary quarantine strategies. We compare the performance of the individual strategies against a hybrid combination strategy, and conclude that the hybrid strategy yields substantial performance improvements, beyond what either technique provides independently. This result offers potential new directions in hybrid quarantine defenses.


conference on privacy, security and trust | 2010

Detection, correlation, and visualization of attacks against critical infrastructure systems

Linda Briesemeister; Steven Cheung; Ulf Lindqvist; Alfonso Valdes

Digital control systems are essential to the safe and efficient operation of a variety of industrial processes in sectors such as electric power, oil and gas, water treatment, and manufacturing. Modern control systems are increasingly connected to other control systems as well as to corporate systems. They are also increasingly adopting networking technology and system and application software from conventional enterprise systems. These trends can make control systems vulnerable to cyber attack, which in the case of control systems may impact physical processes causing environmental harm or injury. We present some results of the DATES (Detection and Analysis of Threats to the Energy Sector) project, wherein we adapted and developed several intrusion detection technologies for control systems. The suite of detection technologies was integrated and connected to a commercial security event correlation framework from ArcSight. We demonstrated the efficacy of our detection and correlation solution on two coupled testbed environments. We particularly focused on detection, correlation, and visualization of a network traversal attack, where an attacker penetrates successive network layers to compromise critical assets that directly control the underlying process. Such an attack is of particular concern in the layered architectures typical of control system implementations.


workshop on parallel and distributed simulation | 2005

Microscopic Simulation of a Group Defense Strategy

Linda Briesemeister; Phillip A. Porras

We introduce a novel worm containment strategy that integrates two complementary worm quarantine techniques. The two techniques are linked, with one strategy employing the other as an indicator of worm infection. A group defense mechanism shares such indicators among neighboring networks, and when enough corroboration occurs, the network engages in traffic filtering to halt infection attempts. We present an SSFnet-based microscopic simulation of the containment strategy against random scan worms, and explore various performance characteristics of the group defense mechanism. The simulation results help to characterize the conditions and degree to which the integrated quarantine strategy can both slow worm propagation and prevent the worm from reaching its full saturation potential.


international performance computing and communications conference | 2006

Automatically deducing propagation sequences that circumvent a collaborative worm defense

Linda Briesemeister; Phillip A. Porras

We present an approach to the question of evaluating worm defenses against future, yet unseen, and possibly defense-aware worm behavior. Our scheme employs model checking to produce worm propagation sequences that defeat a worm defense of interest. We demonstrate this approach using an exemplar collaborative worm defense, in which LANs share alerts about encountered infections. Through model checking experiments, we then generate propagation sequences that are able to infect the whole population in the modeled network. We discuss these experimental results and also identify open problems in applying formal methods more generally in the context of worm quarantine research


international conference on security and privacy in communication systems | 2014

JumpBox – A Seamless Browser Proxy for Tor Pluggable Transports

Jeroen Massar; Ian Mason; Linda Briesemeister; Vinod Yegneswaran

Anonymity systems such as Tor are being blocked by many countries, as they are increasingly being used to circumvent censorship systems. As a response, several pluggable transport (proxy) systems have been developed that obfuscate the first hop of the Tor circuit (i.e., the connection between the Tor client and the bridge node). In this paper, we tackle a common challenge faced by all web-based pluggable transports – the need to perfectly emulate the complexities of a web-browser and web-server. To that end, we propose a new system called the JumpBox that readily integrates with existing pluggable transports and avoids emulation by forwarding the HTTP/HTTPS requests through a real browser and webserver. We evaluate our system using multiple pluggable transports and demonstrate that it imposes minimal additional overhead.


computational systems bioinformatics | 2005

Pathway logic helping biologists understand and organize pathway information

Merrill Knapp; Linda Briesemeister; Steven Eker; Patrick Lincoln; Andy Poggio; Carolyn L. Talcott; Keith R. Laderoute

Pathway Logic is an application of techniques from formal methods to the modeling and analysis of signal transduction networks in mammalian cells. These signaling network models are developed using Maude, a symbolic language founded on rewriting logic. Network elements (reactions) are represented as rewrite rules. Models can be queried (analyzed) using the execution, search and model-checking tools of the Maude system. Collections of rules and initial states of interest form a novel kind of database where a biologist can record results of both curation and experiments.


Archive | 2005

Method and apparatus for combating malicious code

Phillip A. Porras; Linda Briesemeister


Electronic Notes in Theoretical Computer Science | 2007

A Rewriting Logic Framework for Soft Constraints

Martin Wirsing; Grit Denker; Carolyn L. Talcott; Andy Poggio; Linda Briesemeister

Collaboration


Dive into the Linda Briesemeister's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge