BBN Technologies

Displaying 1-16 of 16 results

  • White Papers // Jan 2012

    Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues

    The Border Gateway Protocol (BGP), which is used to distribute routing information between autonomous systems, is an important component of the Internet's routing infrastructure. Secure BGP (S-BGP) addresses critical BGP vulnerabilities by providing a scalable means of verifying the authenticity and authorization of BGP control traffic. To facilitate widespread adoption,...

    Provided By BBN Technologies

  • White Papers // Aug 2011

    A Unified Metric for Routing and Rate Adaptation in Multi-Rate Wireless Mesh Networks

    In this paper, the authors propose a new metric that is applicable both to routing and rate adaptation in multi-rate wireless mesh networks. Unlike many previous efforts, the metric is comprehensive; it considers several factors that affect end-to-end performance such as the effect of the relative positions of the links...

    Provided By BBN Technologies

  • White Papers // Apr 2011

    Evaluating QoS-Enabled Information Management Services in a Navy Operational Context

    Information Management (IM) services support the discovery, brokering, and dissemination of mission-critical information based on the information's content and characteristics. IM services support the dissemination of future information (through subscriptions) and past information (through queries) regardless of its source. To be useful across enterprise and tactical environments, IM services need...

    Provided By BBN Technologies

  • White Papers // Mar 2011

    A Survey of Security Concepts for Common Operating Environments

    As newer software engineering technologies, such as Service-Oriented Architecture (SOA), become the basis for mission-critical systems, they must include security as a foundational capability. This paper highlights security concepts relevant to using SOA as a foundation for a Common Operating Environment (COE), i.e., a set of infrastructure and common services...

    Provided By BBN Technologies

  • White Papers // Aug 2010

    XDDS: A Scalable Guard-Agnostic Cross Domain Discovery Service

    As both the Department of Defense and the Intelligence Community are moving toward Service-Oriented Architecture (SOA), it is important to ensure that SOA-based systems can operate and exchange classified information across domain boundaries in support of support net-centric missions. The interplay between SOA and Cross Domain Solutions (CDS) raise a...

    Provided By BBN Technologies

  • White Papers // Jan 2010

    Component Technology and QoS Management

    Component-based technologies make it possible to decompose complex software systems into functional software components. Unfortunately, most component technology does little to address non-functional Quality of Service (QoS) requirements that concern the run-time execution of the software. This paper is developing a technique to enable one to satisfy QoS requirements of...

    Provided By BBN Technologies

  • White Papers // Oct 2009

    Defense-Enabled Applications

    Some applications can be given increased resistance to malicious attack even though the environment in which they run is untrustworthy. The authors call any such application "Defense-enabled". This paper explains the principles behind defense enabling and the assumptions on which it depends. Ideally, one defends a computer system against malicious...

    Provided By BBN Technologies

  • White Papers // Jul 2009

    Cyber-Physical Systems Security-Challenges and Research Ideas

    Cyber-Physical Systems (CPS) are at a crossroads. Typical CPSs with multi-loop control consisting of device controllers, plant-level distributed control, and system-wide SCADA components are pushed (see Figure 1 below) by market forces to: Connect many diverse (e.g., control and business) systems leading to an internetworked system of systems spanning wide...

    Provided By BBN Technologies

  • White Papers // Jun 2009

    Dynamic Provisioning System for Bandwidth-Scalable Core Optical Network

    This paper describe the architecture of PHAROS (Petabit Highly-Agile Robust Optical System), developed under the DARPA CORONET program. PHAROS provides traffic engineering, resource management and signaling solutions for highly-agile, large-capacity core optical networks. PHAROS technology facilitates rapid configuration of network resources to address dynamic traffic needs in future global military...

    Provided By BBN Technologies

  • White Papers // May 2009

    What Next in Intrusion Tolerance

    Emerging software technologies such as SOA, cloud computing and semantic web are challenging some of the assumptions made in the existing designs of intrusion tolerant systems. This paper provides an analysis of the changing landscape, describes the newly introduced risks and vulnerabilities, and briefly outlines research efforts that may point...

    Provided By BBN Technologies

  • White Papers // May 2009

    Attribute-Based Prevention of Phishing Attacks

    This paper describes a set of innovative attribute based checks for defending against phishing attacks. It explains a number of anti-phishing algorithms implemented as plugins and highlight which attributes of phishing sites they consider. To assess the effectiveness and applicability of this prototype, it performed extensive experimental testing. It presents...

    Provided By BBN Technologies

  • White Papers // Feb 2009

    Semantic Network Layering

    The stack in various forms has been widely used as an architectural template for networking systems. Recently the stack has been subject to criticism for a lack of flexibility. However, when it comes right down to it nobody has offered a truly compelling alternative. Various "Cross-layer" optimizations have been proposed,...

    Provided By BBN Technologies

  • White Papers // Feb 2009

    Issues in Context-Aware and Adaptive Middleware for Wireless, Mobile Networked Systems

    Computing devices, including the obvious PDAs, GPSs, iPods, cell phones and laptops, as well as the less obvious ones embedded inside automobiles, appliances, smart buildings, and even greeting cards, permeate the daily lives. Many of these computing devices are already interconnected and more are becoming so, frequently through wireless connections...

    Provided By BBN Technologies

  • White Papers // Nov 2008

    Declarative Network Verification

    In this paper, the authors present their initial design and implementation of a Declarative Network Verifier (DNV). DNV utilizes theorem proving, a well established verification technique where logic-based axioms that automatically capture network semantics are generated, and a user-driven proof process is used to establish network correctness properties. DNV takes...

    Provided By BBN Technologies

  • White Papers // Sep 2008

    A Case for Predictive DiffServ on Mobile Networks

    Differentiated Service is intended to achieve scalable service differentiation within the network. A protocol with its QoS semantics left up to off-line Service Level Agreements (SLAs) between the network and application, it is inapplicable to mobile environments: lacks real-time QoS feedback from the network to the application; cannot guarantee SLAs...

    Provided By BBN Technologies

  • White Papers // Sep 2008

    Supporting Safe Content-Inspection of Web Traffic

    As more and more interactions (including personal, financial, and social) become Web-based, a number of observations can be made. First, as technology advances and public awareness of Internet security increases, an increasing portion of Web traffic is likely to be carried by HyperText Transfer Protocol Secure (HTTPS). Second, while that...

    Provided By BBN Technologies

  • White Papers // May 2009

    What Next in Intrusion Tolerance

    Emerging software technologies such as SOA, cloud computing and semantic web are challenging some of the assumptions made in the existing designs of intrusion tolerant systems. This paper provides an analysis of the changing landscape, describes the newly introduced risks and vulnerabilities, and briefly outlines research efforts that may point...

    Provided By BBN Technologies

  • White Papers // Sep 2008

    Supporting Safe Content-Inspection of Web Traffic

    As more and more interactions (including personal, financial, and social) become Web-based, a number of observations can be made. First, as technology advances and public awareness of Internet security increases, an increasing portion of Web traffic is likely to be carried by HyperText Transfer Protocol Secure (HTTPS). Second, while that...

    Provided By BBN Technologies

  • White Papers // Sep 2008

    A Case for Predictive DiffServ on Mobile Networks

    Differentiated Service is intended to achieve scalable service differentiation within the network. A protocol with its QoS semantics left up to off-line Service Level Agreements (SLAs) between the network and application, it is inapplicable to mobile environments: lacks real-time QoS feedback from the network to the application; cannot guarantee SLAs...

    Provided By BBN Technologies

  • White Papers // Nov 2008

    Declarative Network Verification

    In this paper, the authors present their initial design and implementation of a Declarative Network Verifier (DNV). DNV utilizes theorem proving, a well established verification technique where logic-based axioms that automatically capture network semantics are generated, and a user-driven proof process is used to establish network correctness properties. DNV takes...

    Provided By BBN Technologies

  • White Papers // Aug 2011

    A Unified Metric for Routing and Rate Adaptation in Multi-Rate Wireless Mesh Networks

    In this paper, the authors propose a new metric that is applicable both to routing and rate adaptation in multi-rate wireless mesh networks. Unlike many previous efforts, the metric is comprehensive; it considers several factors that affect end-to-end performance such as the effect of the relative positions of the links...

    Provided By BBN Technologies

  • White Papers // Oct 2009

    Defense-Enabled Applications

    Some applications can be given increased resistance to malicious attack even though the environment in which they run is untrustworthy. The authors call any such application "Defense-enabled". This paper explains the principles behind defense enabling and the assumptions on which it depends. Ideally, one defends a computer system against malicious...

    Provided By BBN Technologies

  • White Papers // Jan 2012

    Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues

    The Border Gateway Protocol (BGP), which is used to distribute routing information between autonomous systems, is an important component of the Internet's routing infrastructure. Secure BGP (S-BGP) addresses critical BGP vulnerabilities by providing a scalable means of verifying the authenticity and authorization of BGP control traffic. To facilitate widespread adoption,...

    Provided By BBN Technologies

  • White Papers // May 2009

    Attribute-Based Prevention of Phishing Attacks

    This paper describes a set of innovative attribute based checks for defending against phishing attacks. It explains a number of anti-phishing algorithms implemented as plugins and highlight which attributes of phishing sites they consider. To assess the effectiveness and applicability of this prototype, it performed extensive experimental testing. It presents...

    Provided By BBN Technologies

  • White Papers // Feb 2009

    Issues in Context-Aware and Adaptive Middleware for Wireless, Mobile Networked Systems

    Computing devices, including the obvious PDAs, GPSs, iPods, cell phones and laptops, as well as the less obvious ones embedded inside automobiles, appliances, smart buildings, and even greeting cards, permeate the daily lives. Many of these computing devices are already interconnected and more are becoming so, frequently through wireless connections...

    Provided By BBN Technologies

  • White Papers // Jun 2009

    Dynamic Provisioning System for Bandwidth-Scalable Core Optical Network

    This paper describe the architecture of PHAROS (Petabit Highly-Agile Robust Optical System), developed under the DARPA CORONET program. PHAROS provides traffic engineering, resource management and signaling solutions for highly-agile, large-capacity core optical networks. PHAROS technology facilitates rapid configuration of network resources to address dynamic traffic needs in future global military...

    Provided By BBN Technologies

  • White Papers // Jan 2010

    Component Technology and QoS Management

    Component-based technologies make it possible to decompose complex software systems into functional software components. Unfortunately, most component technology does little to address non-functional Quality of Service (QoS) requirements that concern the run-time execution of the software. This paper is developing a technique to enable one to satisfy QoS requirements of...

    Provided By BBN Technologies

  • White Papers // Jul 2009

    Cyber-Physical Systems Security-Challenges and Research Ideas

    Cyber-Physical Systems (CPS) are at a crossroads. Typical CPSs with multi-loop control consisting of device controllers, plant-level distributed control, and system-wide SCADA components are pushed (see Figure 1 below) by market forces to: Connect many diverse (e.g., control and business) systems leading to an internetworked system of systems spanning wide...

    Provided By BBN Technologies

  • White Papers // Feb 2009

    Semantic Network Layering

    The stack in various forms has been widely used as an architectural template for networking systems. Recently the stack has been subject to criticism for a lack of flexibility. However, when it comes right down to it nobody has offered a truly compelling alternative. Various "Cross-layer" optimizations have been proposed,...

    Provided By BBN Technologies

  • White Papers // Apr 2011

    Evaluating QoS-Enabled Information Management Services in a Navy Operational Context

    Information Management (IM) services support the discovery, brokering, and dissemination of mission-critical information based on the information's content and characteristics. IM services support the dissemination of future information (through subscriptions) and past information (through queries) regardless of its source. To be useful across enterprise and tactical environments, IM services need...

    Provided By BBN Technologies

  • White Papers // Mar 2011

    A Survey of Security Concepts for Common Operating Environments

    As newer software engineering technologies, such as Service-Oriented Architecture (SOA), become the basis for mission-critical systems, they must include security as a foundational capability. This paper highlights security concepts relevant to using SOA as a foundation for a Common Operating Environment (COE), i.e., a set of infrastructure and common services...

    Provided By BBN Technologies

  • White Papers // Aug 2010

    XDDS: A Scalable Guard-Agnostic Cross Domain Discovery Service

    As both the Department of Defense and the Intelligence Community are moving toward Service-Oriented Architecture (SOA), it is important to ensure that SOA-based systems can operate and exchange classified information across domain boundaries in support of support net-centric missions. The interplay between SOA and Cross Domain Solutions (CDS) raise a...

    Provided By BBN Technologies