MITRE

Displaying 1-28 of 28 results

  • White Papers // Nov 2012

    Multilateral Approaches for Improving Global Security in Cyberspace

    Effective cyber security requires that national governments, private companies, and non-governmental organizations work together to understand threats in cyberspace and to share information and capabilities for mitigating those threats. This is necessary because cyberspace is an interconnected environment that provides tremendous benefits to nations, organizations and individuals. Unfortunately, this environment...

    Provided By MITRE

  • White Papers // Mar 2012

    Minimum-Cost First-Push-Then-Pull Gossip Algorithm

    In this paper, the authors study the communication overhead of gossip-based information dissemination algorithms. Among basic variants of gossip algorithm push is most efficient in the early rounds while, in contrast, pull becomes more efficient in the later rounds. Therefore, a cost-efficient gossip algorithm needs to combine the advantages of...

    Provided By MITRE

  • White Papers // Jun 2011

    Information Security in the Clouds

    From the perspective of information security, cloud computing elicits one of two responses: Security issues make cloud computing very risky and Security issues are more perceptual than prohibitive. Paradoxically, both positions have merit. Along with the benefits, this new model of computing resource delivery presents Federal IT leaders and security...

    Provided By MITRE

  • White Papers // Apr 2011

    Enabling Rich Discovery of Web Services by Projecting Weak Semantics From Structural Specifications

    Although the authors would prefer using defined ontologies that express the domains and specifications of web services, and thus more easily discover and compose these, they know that in the mainstream world represented by the US Department of Defense they will not have those ontologies available soon. In the meantime...

    Provided By MITRE

  • White Papers // Jan 2011

    Building Secure, Resilient Architectures for Cyber Mission Assurance

    Today's Information Technology (IT) environments are increasingly subject to escalating cyber attacks. Cyber threats vary widely in sophistication, intent, and the consequences to the targeted systems and networks. The range of attackers extends from users who unintentionally damage systems to hackers, to cyber criminals, to full-scale cyber spies and cyber...

    Provided By MITRE

  • White Papers // Dec 2010

    Feasibility Analysis of GPS III Integrated With an Inertial System to Provide Cat IIIb Services

    This paper describes a follow-on analysis of the potential for an integrated GPS III/Inertial Reference System (IRS) to provide CATegory IIIB (CAT IIIB) precision approach and landing services. Three different levels of GPS III capability are considered: one without cross-link (GPS IIIA), one with cross-link but without improved integrity assurance...

    Provided By MITRE

  • White Papers // Oct 2010

    Toward an Ontology Architecture for Cyber-Security Standards

    The rapid growth in magnitude and complexity of Cyber-Security Information and Event Management (CSIEM) has ignited a trend toward security automation and information exchange standards. Making Security Measurable (MSM) references a collection of open community standards for the common enumeration, expression and reporting of cyber-security-related information. While MSM-related standards are...

    Provided By MITRE

  • White Papers // Sep 2010

    How Do You Assess Your Organization's Cyber Threat Level?

    In the Cyber Prep methodology, an organization determines its target level of preparedness against cyber threats, including the advanced persistent threat, based on its assessment of the level of the adversary it faces. That is, an organization calibrates its cyber security measures, as well as its cyber security governance, to...

    Provided By MITRE

  • White Papers // Sep 2010

    CYBEX - The Cybersecurity Information Exchange Framework

    The cybersecurity information exchange framework, known as CYBEX, is currently undergoing its first iteration of standardization efforts within ITU-T. The framework describes how cybersecurity information is exchanged between cybersecurity entities on a global scale and how the exchange is assured. The worldwide implementation of the framework will eventually minimize the...

    Provided By MITRE

  • White Papers // Sep 2010

    Cyber Security Governance

    Cyber Prep is a conceptual framework, together with a practical methodology, which an organization uses to define and implement its strategy for addressing adversarial threats related to its dependence on cyberspace. In particular, Cyber Prep enables organizations to articulate their strategies for addressing the Advanced Persistent Threat (APT). The Cyber...

    Provided By MITRE

  • White Papers // Sep 2010

    Cloud SLA Considerations for the Government Consumer

    During the past year, much work has been done to provide a set of terms and definitions that will enable the common discussion of cloud computing. The National Institute of Standards and Technology (NIST) have defined emerging cloud service models to include Infrastructure as a Service (IaaS), Platform as a...

    Provided By MITRE

  • White Papers // Aug 2010

    A Domain-Level Data Model for Automated Network Configuration

    Emerging research activities and technologies such as NETCONF have been closing gaps in the realization of automated network management; however they focus on individual network devices rather than the network domain as a whole. A robust model that maps a network domain's aggregate properties to device-specific NETCONF entities would allow...

    Provided By MITRE

  • White Papers // Aug 2010

    Evaluating the Impact of Cyber Attacks on Missions

    Using current methods, it is virtually impossible to determine the impact of a cyber attack on the attainment of mission objectives. Do the authors know which mission elements are affected? Can they continue to operate and fulfill the mission? Should they wait for recovery? Can they salvage part of the...

    Provided By MITRE

  • White Papers // Aug 2010

    A Decision Process for Applying Cloud Computing in Federal Environments

    Commercial industry's use of cloud computing, leveraging economies of scale, commoditizing processing power and storage, and incrementally leasing only the Information Technology (IT) infrastructure that is needed at a given moment, is presenting a compelling business model to Federal leadership, worthy of further investigation. In considering the application of cloud...

    Provided By MITRE

  • White Papers // Jul 2010

    An Adaptive Technique for Data Compression and Robustness at the Tactical Edge

    An adaptive technique for reliable and fast transmission of streaming data at the tactical edge is presented. This technique combines data compression and data robustness to optimize for BW, reliability and speed of transmission in an adaptive matter. Speed of transmission and reducing BW needed for transmission is achieved by...

    Provided By MITRE

  • White Papers // Jul 2010

    GPU Accelerated Radio Path Loss Estimation With Neural Networks

    Radio path loss prediction is an important but computationally expensive component of wireless communications simulation. Models may require significant computation to reach a solution or require that information about the environment between transceivers be collected as model inputs which may also be computationally expensive. Despite the complexity of the underlying...

    Provided By MITRE

  • White Papers // Jul 2010

    Products to Build a Private Cloud

    For Federal Information Technology (IT) leaders considering employing a private cloud approach, this paper provides a window into products that are available from the commercial marketplace. The paper is organized into the general categories of virtualization and hypervisors, storage (e.g., storage area networks, storage arrays), security, and provisioning, management, and...

    Provided By MITRE

  • White Papers // Jun 2010

    DoD's Perspective on Radar Open Architectures

    The way radars are viewed by the Department of Defense (DoD) is migrating from that of monolithic "Black box" providers of primary interpretable radar data products for pre-planned users, to that of flexible providers of on-demand sensing services widely available to an interconnected network of unanticipated users. Radar systems open...

    Provided By MITRE

  • White Papers // May 2010

    Environment-Aware Reputation Management for Ad Hoc Networks

    Reputation management is a mechanism that has been proposed to mitigate against internal node misbehavior with respect to the packet forwarding functionality in ad hoc networks. Their goal is to promote cooperation among nodes by building a reputation for each and utilizing that reputation in offering differentiated services to different...

    Provided By MITRE

  • White Papers // Apr 2010

    Social Radar for Smart Power

    The center of gravity in modern warfare not only includes military targets such as tanks, ships, planes, command and control facilities, and military forces but equally important the perceptions, intentions and behaviors of citizens and leaders. This vision document develops the metaphor for a Social Radar, describes a framework for...

    Provided By MITRE

  • White Papers // Apr 2010

    Dependable Objects for Databases, Middleware and Methodologies: A Position Paper

    This position paper describes work that needs to be done to integrate features of security, fault tolerance, and real-time computing into object-oriented technology to produce "Dependable Objects". This dependable technology can be applied in the areas of database; middleware, including object-request brokers; and object-based design and analysis methodologies. The accomplishments...

    Provided By MITRE

  • White Papers // Apr 2010

    Analysis of Specified and Hypothetical GPS IIIC Integrity for LPV 200 Operations

    All GPS satellites broadcast a User Range Accuracy (URA) parameter that may be used to statistically characterize the Instantaneous User Range Error (IURE) due to the satellite Signal In Space (SIS). As the performance of GPS has evolved and improved, the URA has taken on a very specific role for...

    Provided By MITRE

  • White Papers // Apr 2010

    Endpoint Naming for Space Delay / Disruption Tolerant Networking

    Delay/Disruption Tolerant Networking (DTN) provides solutions to space communication challenges such as disconnections when orbiters lose line-of-sight with landers, long propagation delays over interplanetary links, and other operational constraints. DTN is critical to enabling the future space internetworking envisioned by NASA. Interoperability with international partners is essential and standardization is...

    Provided By MITRE

  • White Papers // Apr 2010

    Selected MITRE Cyber-Related Research and Initiatives

    Over the past few years, the Advanced Cyber Threat (ACT) has driven them to evolve the authors' perspective of cyber security and information assurance. Advanced cyber adversaries have growing arsenals that include attacks on the global supply chain, insider subversion, physical attacks on supporting infrastructures, social engineering, and slow-moving cyber...

    Provided By MITRE

  • White Papers // Jan 2010

    Methods to Achieve Capacity and Quality of Service in Ad Hoc Networks

    The Synchronous Collision Resolution medium access control protocol uses contention resolution signaling to arbitrate access to a shared wireless medium. This signaling also provides a mechanism that enables the protocol to provide quality of service and to manage physical layer characteristics. Authors explain how it: ensures that nodes sending higher...

    Provided By MITRE

  • White Papers // Nov 2009

    Securing Multicast DNS Study Into the Feasibility of Trusted Multicast DNS for Service Discovery

    This paper looks at how developers can use open and freely available technology to provide a level of identity security and trust to service discovery in an untrusted ad-hoc network environment. Initial research shows that using multicast Domain Name Services (DNS) when coupled with X.509 machine-issued certificates gives an adequate...

    Provided By MITRE

  • White Papers // May 2009

    Considerations for Versioning SOA Resources

    Service oriented architecture is a paradigm for bringing together needs and capabilities, where SOA services provide an effective means of connecting consumers and the means to realize desired real world effects. The resources accessed as part of SOA interactions are independently owned and evolved but must be unambiguously identifiable. In...

    Provided By MITRE

  • White Papers // Mar 2009

    Adding To The Regulators Toolbox: Integration And Extension Of Two Leading Market Models

    As demonstrated during the recent financial crisis, regulators require additional analytical tools to assess systemic risk in the financial sector. This paper describes one such tool; namely a novel market modeling and analysis capability. The authors' model builds upon two leading market models: one which emphasizes market micro-structure and another...

    Provided By MITRE

  • White Papers // Apr 2010

    Analysis of Specified and Hypothetical GPS IIIC Integrity for LPV 200 Operations

    All GPS satellites broadcast a User Range Accuracy (URA) parameter that may be used to statistically characterize the Instantaneous User Range Error (IURE) due to the satellite Signal In Space (SIS). As the performance of GPS has evolved and improved, the URA has taken on a very specific role for...

    Provided By MITRE

  • White Papers // May 2010

    Environment-Aware Reputation Management for Ad Hoc Networks

    Reputation management is a mechanism that has been proposed to mitigate against internal node misbehavior with respect to the packet forwarding functionality in ad hoc networks. Their goal is to promote cooperation among nodes by building a reputation for each and utilizing that reputation in offering differentiated services to different...

    Provided By MITRE

  • White Papers // Sep 2010

    CYBEX - The Cybersecurity Information Exchange Framework

    The cybersecurity information exchange framework, known as CYBEX, is currently undergoing its first iteration of standardization efforts within ITU-T. The framework describes how cybersecurity information is exchanged between cybersecurity entities on a global scale and how the exchange is assured. The worldwide implementation of the framework will eventually minimize the...

    Provided By MITRE

  • White Papers // Mar 2012

    Minimum-Cost First-Push-Then-Pull Gossip Algorithm

    In this paper, the authors study the communication overhead of gossip-based information dissemination algorithms. Among basic variants of gossip algorithm push is most efficient in the early rounds while, in contrast, pull becomes more efficient in the later rounds. Therefore, a cost-efficient gossip algorithm needs to combine the advantages of...

    Provided By MITRE

  • White Papers // Nov 2012

    Multilateral Approaches for Improving Global Security in Cyberspace

    Effective cyber security requires that national governments, private companies, and non-governmental organizations work together to understand threats in cyberspace and to share information and capabilities for mitigating those threats. This is necessary because cyberspace is an interconnected environment that provides tremendous benefits to nations, organizations and individuals. Unfortunately, this environment...

    Provided By MITRE

  • White Papers // May 2009

    Considerations for Versioning SOA Resources

    Service oriented architecture is a paradigm for bringing together needs and capabilities, where SOA services provide an effective means of connecting consumers and the means to realize desired real world effects. The resources accessed as part of SOA interactions are independently owned and evolved but must be unambiguously identifiable. In...

    Provided By MITRE

  • White Papers // Apr 2011

    Enabling Rich Discovery of Web Services by Projecting Weak Semantics From Structural Specifications

    Although the authors would prefer using defined ontologies that express the domains and specifications of web services, and thus more easily discover and compose these, they know that in the mainstream world represented by the US Department of Defense they will not have those ontologies available soon. In the meantime...

    Provided By MITRE

  • White Papers // Mar 2009

    Adding To The Regulators Toolbox: Integration And Extension Of Two Leading Market Models

    As demonstrated during the recent financial crisis, regulators require additional analytical tools to assess systemic risk in the financial sector. This paper describes one such tool; namely a novel market modeling and analysis capability. The authors' model builds upon two leading market models: one which emphasizes market micro-structure and another...

    Provided By MITRE

  • White Papers // Sep 2010

    Cyber Security Governance

    Cyber Prep is a conceptual framework, together with a practical methodology, which an organization uses to define and implement its strategy for addressing adversarial threats related to its dependence on cyberspace. In particular, Cyber Prep enables organizations to articulate their strategies for addressing the Advanced Persistent Threat (APT). The Cyber...

    Provided By MITRE

  • White Papers // Dec 2010

    Feasibility Analysis of GPS III Integrated With an Inertial System to Provide Cat IIIb Services

    This paper describes a follow-on analysis of the potential for an integrated GPS III/Inertial Reference System (IRS) to provide CATegory IIIB (CAT IIIB) precision approach and landing services. Three different levels of GPS III capability are considered: one without cross-link (GPS IIIA), one with cross-link but without improved integrity assurance...

    Provided By MITRE

  • White Papers // Jul 2010

    Products to Build a Private Cloud

    For Federal Information Technology (IT) leaders considering employing a private cloud approach, this paper provides a window into products that are available from the commercial marketplace. The paper is organized into the general categories of virtualization and hypervisors, storage (e.g., storage area networks, storage arrays), security, and provisioning, management, and...

    Provided By MITRE

  • White Papers // Jun 2011

    Information Security in the Clouds

    From the perspective of information security, cloud computing elicits one of two responses: Security issues make cloud computing very risky and Security issues are more perceptual than prohibitive. Paradoxically, both positions have merit. Along with the benefits, this new model of computing resource delivery presents Federal IT leaders and security...

    Provided By MITRE

  • White Papers // Aug 2010

    A Decision Process for Applying Cloud Computing in Federal Environments

    Commercial industry's use of cloud computing, leveraging economies of scale, commoditizing processing power and storage, and incrementally leasing only the Information Technology (IT) infrastructure that is needed at a given moment, is presenting a compelling business model to Federal leadership, worthy of further investigation. In considering the application of cloud...

    Provided By MITRE

  • White Papers // Jan 2011

    Building Secure, Resilient Architectures for Cyber Mission Assurance

    Today's Information Technology (IT) environments are increasingly subject to escalating cyber attacks. Cyber threats vary widely in sophistication, intent, and the consequences to the targeted systems and networks. The range of attackers extends from users who unintentionally damage systems to hackers, to cyber criminals, to full-scale cyber spies and cyber...

    Provided By MITRE

  • White Papers // Jan 2010

    Methods to Achieve Capacity and Quality of Service in Ad Hoc Networks

    The Synchronous Collision Resolution medium access control protocol uses contention resolution signaling to arbitrate access to a shared wireless medium. This signaling also provides a mechanism that enables the protocol to provide quality of service and to manage physical layer characteristics. Authors explain how it: ensures that nodes sending higher...

    Provided By MITRE

  • White Papers // Apr 2010

    Dependable Objects for Databases, Middleware and Methodologies: A Position Paper

    This position paper describes work that needs to be done to integrate features of security, fault tolerance, and real-time computing into object-oriented technology to produce "Dependable Objects". This dependable technology can be applied in the areas of database; middleware, including object-request brokers; and object-based design and analysis methodologies. The accomplishments...

    Provided By MITRE

  • White Papers // Sep 2010

    Cloud SLA Considerations for the Government Consumer

    During the past year, much work has been done to provide a set of terms and definitions that will enable the common discussion of cloud computing. The National Institute of Standards and Technology (NIST) have defined emerging cloud service models to include Infrastructure as a Service (IaaS), Platform as a...

    Provided By MITRE

  • White Papers // Oct 2010

    Toward an Ontology Architecture for Cyber-Security Standards

    The rapid growth in magnitude and complexity of Cyber-Security Information and Event Management (CSIEM) has ignited a trend toward security automation and information exchange standards. Making Security Measurable (MSM) references a collection of open community standards for the common enumeration, expression and reporting of cyber-security-related information. While MSM-related standards are...

    Provided By MITRE

  • White Papers // Sep 2010

    How Do You Assess Your Organization's Cyber Threat Level?

    In the Cyber Prep methodology, an organization determines its target level of preparedness against cyber threats, including the advanced persistent threat, based on its assessment of the level of the adversary it faces. That is, an organization calibrates its cyber security measures, as well as its cyber security governance, to...

    Provided By MITRE

  • White Papers // Aug 2010

    A Domain-Level Data Model for Automated Network Configuration

    Emerging research activities and technologies such as NETCONF have been closing gaps in the realization of automated network management; however they focus on individual network devices rather than the network domain as a whole. A robust model that maps a network domain's aggregate properties to device-specific NETCONF entities would allow...

    Provided By MITRE

  • White Papers // Aug 2010

    Evaluating the Impact of Cyber Attacks on Missions

    Using current methods, it is virtually impossible to determine the impact of a cyber attack on the attainment of mission objectives. Do the authors know which mission elements are affected? Can they continue to operate and fulfill the mission? Should they wait for recovery? Can they salvage part of the...

    Provided By MITRE

  • White Papers // Apr 2010

    Endpoint Naming for Space Delay / Disruption Tolerant Networking

    Delay/Disruption Tolerant Networking (DTN) provides solutions to space communication challenges such as disconnections when orbiters lose line-of-sight with landers, long propagation delays over interplanetary links, and other operational constraints. DTN is critical to enabling the future space internetworking envisioned by NASA. Interoperability with international partners is essential and standardization is...

    Provided By MITRE

  • White Papers // Nov 2009

    Securing Multicast DNS Study Into the Feasibility of Trusted Multicast DNS for Service Discovery

    This paper looks at how developers can use open and freely available technology to provide a level of identity security and trust to service discovery in an untrusted ad-hoc network environment. Initial research shows that using multicast Domain Name Services (DNS) when coupled with X.509 machine-issued certificates gives an adequate...

    Provided By MITRE

  • White Papers // Jun 2010

    DoD's Perspective on Radar Open Architectures

    The way radars are viewed by the Department of Defense (DoD) is migrating from that of monolithic "Black box" providers of primary interpretable radar data products for pre-planned users, to that of flexible providers of on-demand sensing services widely available to an interconnected network of unanticipated users. Radar systems open...

    Provided By MITRE

  • White Papers // Jul 2010

    An Adaptive Technique for Data Compression and Robustness at the Tactical Edge

    An adaptive technique for reliable and fast transmission of streaming data at the tactical edge is presented. This technique combines data compression and data robustness to optimize for BW, reliability and speed of transmission in an adaptive matter. Speed of transmission and reducing BW needed for transmission is achieved by...

    Provided By MITRE

  • White Papers // Jul 2010

    GPU Accelerated Radio Path Loss Estimation With Neural Networks

    Radio path loss prediction is an important but computationally expensive component of wireless communications simulation. Models may require significant computation to reach a solution or require that information about the environment between transceivers be collected as model inputs which may also be computationally expensive. Despite the complexity of the underlying...

    Provided By MITRE

  • White Papers // Apr 2010

    Social Radar for Smart Power

    The center of gravity in modern warfare not only includes military targets such as tanks, ships, planes, command and control facilities, and military forces but equally important the perceptions, intentions and behaviors of citizens and leaders. This vision document develops the metaphor for a Social Radar, describes a framework for...

    Provided By MITRE

  • White Papers // Apr 2010

    Selected MITRE Cyber-Related Research and Initiatives

    Over the past few years, the Advanced Cyber Threat (ACT) has driven them to evolve the authors' perspective of cyber security and information assurance. Advanced cyber adversaries have growing arsenals that include attacks on the global supply chain, insider subversion, physical attacks on supporting infrastructures, social engineering, and slow-moving cyber...

    Provided By MITRE