Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Napoleon Paxton is active.

Publication


Featured researches published by Napoleon Paxton.


information reuse and integration | 2007

Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks

Napoleon Paxton; Gail Joon Ahn; Bill Chu

Since nearly the beginning of the Internet, malware has been a significant deterrent to productivity for end-users, both personal and business related. A particular malware, known as a hot, can create networks of compromised machines called botnets, which are some of the most threatening adversaries over the Internet due in large part to the difficulty of identifying botnet traffic patterns. We have witnessed that existing signature-based detection and protection methods are ineffective, when used alone, in dealing with new unknown bots. In this paper, we introduce a risk-aware network-centric management framework to detect and prevent targeted botnet attacks as well as propagation attempts within the network. As the first step in that direction we focus on learning more information about the bots by identifying malicious characteristics through the network traffic. Once we have their characteristics we then decide whether or not those characteristics present a significant risk to the network that is being protected by our architecture. Using risk as a factor in the decision process helps identify the bots more systematically. We present two scenarios that describe the risk-aware process and show that our framework shows great promise.


computer software and applications conference | 2011

MasterBlaster: Identifying Influential Players in Botnet Transactions

Napoleon Paxton; Gail Joon Ahn; Mohamed Shehab

Botnets continue to be a critical tool for hackers in exploiting vulnerabilities of systems and destructing computer networks. Botnet monitoring is a method used to study and identify malicious capabilities of a botnet, but current botnet monitoring projects mainly identify the magnitude of the botnet problem and tend to overt some fundamental problems, such as the diversified sources of the attacks. Most malicious botnets have the ability to be rented out to a broad range of potential customers, allowing each customer to launch different attacks from the other. Consequently, under the control of multiple botmasters, various attacks and transactions at different times attempt to damage networked infrastructures. In this paper we propose a multi-layered analysis system called Master Blaster which identifies the communication characteristics of a botmaster in botnet transactions and correlates those characteristics with evolutionary changes within botnet communication channels. Our results show the level of involvement of the monitored botmasters within a botnet as well as their general motives. Our system clearly indicates that the investigation of each botmaster and analysis of botmaster interactions are essential to cope with net-centric attacks caused by botnets.


Cyber Warfare | 2015

A Survey of Community Detection Algorithms Based On Analysis-Intent

Napoleon Paxton; Stephen Russell; Ira S. Moskowitz; Paul Hyden

There has been a significant amount of research dedicated to identifying community structures within graphs. Most of these studies have focused on partitioning techniques and the resultant quality of discovered groupings (communities) without regard for the intent of the analysis being conducted (analysis-intent). In many cases, a given network community can be composed of significantly different elements depending upon the context in which a partitioning technique is used or applied. Moreover, the number of communities within a network will vary greatly depending on the analysis-intent and thus the discretion quality and performance of algorithms will similarly vary. In this survey we review several algorithms from the literature developed to discover community structure within networks. We review these approaches from two analysis perspectives: role/process focused (category-based methods) and topological structure or connection focused (event-based methods). We discuss the strengths and weaknesses of each algorithm and provide suggestions on the algorithms’ use depending on analysis context.


hawaii international conference on system sciences | 2015

Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis

Napoleon Paxton; Dae Il Jang; Stephen Russell; Gail Joon Ahn; Ira S. Moskowitz; Paul Hyden

Increasing situational awareness and investigating the cause of a software-induced cyber attack continues to be one of the most difficult yet important endeavors faced by network security professionals. Traditionally, these forensic pursuits are carried out by manually analyzing the malicious software agents at the heart of the incident, and then observing their interactions in a controlled environment. Both these steps are time consuming and difficult to maintain due to the ever changing nature of malicious software. In this paper we introduce a network science based framework which conducts incident analysis on a dataset by constructing and analyzing relational communities. Construction of these communities is based on the connections of topological features formed when actors communicate with each other. We evaluate our framework using a network trace of the Black Energy malware network, captured by our honey net. We have found that our approach is accurate, efficient, and could prove as a viable alternative to the current status quo.


Archive | 2007

Collecting and Analyzing Bots in a Systematic Honeynet-based Testbed Environment

Napoleon Paxton; Gail Joon Ahn; Richard Kelly; Kevin Pearson; Bei-tseng Chu


3rd International Conference on Information Warfare and Security, ICIW 2008 | 2008

Understanding IRC bot behaviors in network-centric attack detection and prevention framework

Gail Joon Ahn; Napoleon Paxton; Kevin Pearson


collaborative computing | 2014

Identifying network packets across translational boundaries

Napoleon Paxton; Joseph Mathews


collaborative computing | 2014

Discovering and analyzing deviant communities: Methods and experiments

Napoleon Paxton; Dae Il Jang; Ira S. Moskowitz; Gail Joon Ahn; Stephen Russell


Archive | 2014

Developing a Network Science Based Approach to Cyber Incident Analysis

Napoleon Paxton; Ira S. Moskowitz; Stephen Russell; Paul Hyden


Archive | 2014

Advancing Future Network Science through Content Understanding

Paul Hyden; Stephen Russell; David Jakubek; Napoleon Paxton; Ira S. Moskowitz

Collaboration


Dive into the Napoleon Paxton's collaboration.

Top Co-Authors

Avatar

Gail Joon Ahn

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Ira S. Moskowitz

United States Naval Research Laboratory

View shared research outputs
Top Co-Authors

Avatar

Stephen Russell

United States Naval Research Laboratory

View shared research outputs
Top Co-Authors

Avatar

Paul Hyden

United States Naval Research Laboratory

View shared research outputs
Top Co-Authors

Avatar

Dae Il Jang

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Kevin Pearson

University of North Carolina at Charlotte

View shared research outputs
Top Co-Authors

Avatar

Bei-tseng Chu

University of North Carolina at Charlotte

View shared research outputs
Top Co-Authors

Avatar

Bill Chu

University of North Carolina at Charlotte

View shared research outputs
Top Co-Authors

Avatar

Joseph Mathews

United States Naval Research Laboratory

View shared research outputs
Top Co-Authors

Avatar

Mohamed Shehab

University of North Carolina at Charlotte

View shared research outputs
Researchain Logo
Decentralizing Knowledge