Advanced search Help
Resource Type or Special Collection is Theses & Research Reports
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Iranian Century: The Tension Between Iran and the Gulf States
From the thesis abstract: "The Arabian Gulf represents a significant part in the world because of its oil wealth. During the last thirty years, three wars have taken place in the region resulting in regional and global instability: the Iran-Iraq war; the Persian Gulf War of 1990--1991, and the U.S. led invasion of Iraq in 2003. The fall of Iraq made Iran more powerful in the region, and as a domination strategy, Iran launched its nuclear program. Iran represents a major power in the region; it can destabilize the regional balance even more if it controls nuclear weapons, marking a potential arms race in the region Iran's nuclear program is threatening the stability of the region. The highest priority is to make the Gulf region free from weapons of mass destruction by all available means. The Gulf States, the Kingdom of Saudi Arabia (KSA), Kuwait, Bahrain, Oman, the United Arab Emirates (UAE) and Qatar should work collectively to defend their interests. In an unpredictable world, a power vacuum could arise at any time in the region, especially when the United States withdraws from Iraq. More cooperation and coordination through the Gulf Cooperation Council (GCC) could help the Gulf States develop the capacity to play a larger role in their region."
Naval Postgraduate School (U.S.)
Al Kaabi, Khaled M.; Al Kaabi, Yousef H.
2011-12
-
Help a Brother Out: A Case Study in Multinational Intelligence Sharing, NATO SOF
From the thesis abstract: "This thesis examines how to optimize intelligence sharing in a coalition by a thorough literature review and site visits to intelligence sharing organizations in order to establish best practices for multinational intelligence sharing. The newly established NATO [North Atlantic Treaty Organization] SOF [Special Operations Forces] Headquarters (NSHQ) in Mons, Belgium was treated as a test case to validate their intelligence sharing procedures and structures in reference to the authors' identified best practices: mutual gains and benefits; trust; direct control; and accessibility and interoperability. Intelligence support to SOF is a decisive factor, when in conventional operations it often is not; therefore intelligence support to SOF is special - NATO SOF is no exception. The level of intelligence support to SOF normally only exists at the national level, due to bureaucratic obstacles, a need to protect sensitive sources and capabilities, and lack of trust. The NSHQ is experimenting with several innovative methods to enhance trust and streamline intelligence capability amongst NATO SOF forces. There are structural and organizational lessons learned from the establishment of the NSHQ that can be applied to future operations and coalitions."
Naval Postgraduate School (U.S.)
Ara, Martin J.; Brand, Thomas; Larssen, Brage A.
2011-12
-
Ensuring Resiliency of the Milk and Dairy Industry in California
From the thesis abstract: "We model the milk and dairy industry in California focusing on the production, processing, and distribution of bulk milk at the county level. We analyze the sensitivity of this industry when faced with worst-case disruption, where a 'worst-case' disruption corresponds to the greatest shortage of milk supply throughout California. The major highways in California are used to connect all of the counties and illustrate where the bulk milk is moving. We utilize Attacker-Defender (AD) modeling techniques to determine where worst-case disruptions occur. This reveals vulnerabilities within the milk and dairy industry. We examine three specific scenarios: (1) a quarantine of each county due to a Foot and Mouth Disease (FMD) outbreak or any other event that would cause the complete stoppage of production, processing, and movement of milk in a county over a seven day period, (2) 1 to 15 attacks on the milk and dairy industry in a 45 day time period, and (3) the isolation of Northern and Southern California over a seven day time period that could be caused by a natural disaster."
Naval Postgraduate School (U.S.)
Alexander, Robert G.
2011-12
-
Keeping Special Forces Special: Regional Proficiency in Special Forces
From the thesis abstract: "Regional proficiency is a critical capability in irregular warfare (IW). In preparation for increased engagement in irregular warfare, the Department of Defense (DoD) and the Military Services made several significant improvements in developing regional proficiency. While the DoD is attempting to create a new capability in the majority of the Total Force, Special Forces was created to succeed in an IW environment. As a result of its design, Special Forces valued and developed regional proficiency long before this became topical in DoD. Oddly, the last decade of overseas contingency operations which spurred interest in regional proficiency in DoD overall has also threatened regional proficiency development in Special Forces. An analysis of Special Forces training and development reveals that the Special Forces primary means of developing regional proficiency is through deployment experience. While the Special Forces Groups are regionally aligned, several have consistently deployed outside of their Area of Responsibility (AOR) to support combat operations in Iraq and Afghanistan. A survey and a series of interviews were conducted to determine the state of regional proficiency interest in Special Forces. Through survey analysis, several trends were identified. With this information this thesis concludes with a suggested strategy to improve regional proficiency in Special Forces non-commissioned officers (NCOs)."
Naval Postgraduate School (U.S.)
Buswell, Philip A.
2011-12
-
People's Liberation Army-Navy: Taiwan...and Beyond?
From the thesis abstract: "Accompanying the People's Republic of China's (PRC) emergence as a global economic and diplomatic power has been the concurrent phenomenon of its rapid military modernization. This confluence has engendered policy concerns stemming from the notion that if the PRC continues with its current trend of military modernization its regional military influence could at some point potentially rival or surpass that of the United States. This has spawned myriad literature that confronts the subject of the PRC's military modernization. General consensus indicates that the reintegration of Taiwan and countering United States intervention in such a conflict functions as a primary driver behind the PRC's recent military modernization. There is also a modicum of consensus that the PRC's burgeoning global stature has prompted the PLA [People's Liberation Army] to also pursue power-projection type endeavors such as sea line of communication (SLOC) defense and protection. Due to the intrinsic value of naval forces toward these goals, the PLAN [People's Liberation Army-Navy] functions as a sufficient microcosm through which to identify broad PLA intentions. This thesis objectively surveys the PLAN's modernization in order to determine the extent of the balance between the PRC's military problem sets of Taiwan and SLOC protection as impetus for the PLAN's modern mission paradigm."
Naval Postgraduate School (U.S.)
Cole, James B.
2011-12
-
CyberCIEGE Traffic Analysis Extension for Teaching Network Security
From the thesis abstract: "CyberCIEGE is an interactive game simulating realistic scenarios that teaches the players Information Assurance (IA) concepts. The existing game scenarios only provide a high-level abstraction of the networked environment, e.g., nodes do not have Internet protocol (IP) addresses or belong to proper subnets, and there is no packet-level network simulation. This research explored endowing the game with network level traffic analysis, and implementing a game scenario to take advantage of this new capability. Traffic analysis is presented to players in a format similar to existing tools such that learned skills may be easily transferred to future real-world situations. A network traffic analysis tool simulation within CyberCIEGE was developed and this new tool provides the player with traffic analysis capability. Using existing taxonomies of cyber-attacks, the research identified a subset of network-based attacks most amenable to modeling and representation within CyberCIEGE. From the attacks identified, a complementary CyberCIEGE scenario was developed to provide the player with new educational opportunities for network analysis and threat identification. From the attack scenario, players also learn about the effects of these cyber-attacks and glean a more informed understanding of appropriate mitigation measures."
Naval Postgraduate School (U.S.)
Chang, Xuquan Stanley; Chua, Kim Yong
2011-12
-
Two Dilemmas and Vicious Cycle of Confrontation on the Continuity of the Division of the Korean Peninsula
From the thesis abstract: "The continuing division of the Korean Peninsula is the ongoing feature in inter-Korean relations, with repeating cycles of confrontations and conciliations. This thesis identifies contributing factors to the ongoing division from the intricately entangled security relations between the U.S., PRC [People's Republic of China], ROK [Republic of Korea] and DPRK [Democratic People's Republic of Korea]: rivalry and alliance. While struggling for security, they become either a security provider or a threat to other players. Each relational linkage provides an imperative security framework for the two Koreas, but these also have paradoxical security implications--'two dilemmas'--for inter-Korean reconciliation. In the relations of two sets of rivalries--the U.S.--PRC and the ROK--DPRK, the Prisoner's Dilemma explains how the rational player's interest-seeking behavior produces deadlock, even though reconciliation provides better results. Also, in the relations of two sets of alliances, the U.S.--ROK and the PRC--DPRK, the alliance security dilemma explains how divergent interests and threat perceptions between allies work against any reconciliation policy. Moreover, the interaction of rivalry and alliance produces paradoxical security dynamics among the four players, and drives them into the vicious cycle of confrontations. In short, these intricately intertwined and dilemma-contained security relations induce significant conflict between the four players for either confrontational or conciliatory policies."
Naval Postgraduate School (U.S.)
Lee, Young Seok
2011-12
-
Influence: The New Weapon in the Battle for Southeast Asia
From the thesis abstract: "This thesis will provide a background look at China's recent history from World War II to present day to examine how they are gaining influence in the South Pacific and Southeast Asia. China is determined to become a global power and increase its international standing in term of influence and Southeast Asia is the start point. This thesis will also examine different approaches the United States and China use to gain Influence and resources. In particular, this thesis will use math modeling and game theory to explore linkages between assistance and Southeast Asian influence. This thesis examines how Chinese assistance is countering the U.S. efforts in Southeast Asia and why the United States must win the battle. This thesis will look at the current U.S. policies toward China and Southeast Asia and explore possible options for the United States in the future. Also how China may try to take control of the South China Sea. This thesis will make recommendations how the United States could more effectively utilize its resources to keep China in check. The thesis will conclude with recommendation for future policy based on the research to determine if the United States can win the battle for Southeast Asia using influence."
Naval Postgraduate School (U.S.)
Manning, Richard W. R.
2011-12
-
Exploiting Weaknesses: An Approach to Counter Cartel Strategy
From the thesis abstract: "The thesis, 'Exploiting Weaknesses: An Approach to Counter Cartel Strategy,' provided an in-depth case study analysis of Los Zetas transnational criminal network to gain an understanding on its weaknesses and vulnerabilities. The thesis utilized social movement theory to illuminate its mobilizing structure and key essential factors that make Los Zetas vulnerable to disruption. In addition, the study identified Los Zetas' financial support structure to expose its insidious methods. Finally, the thesis utilized social network analysis and geographical information systems to gain an understanding of its organizational networks, deduce possible safe havens, and key terrain of Los Zetas. Ultimately, the employment of the aforementioned theories revealed essential vulnerabilities, which form the essence of a practical disruption policy recommendation against Los Zetas."
Naval Postgraduate School (U.S.)
Reyna, Enrique J.; Castellanos, Dennis J.
2011-12
-
Assessing the Effects of Honeypots on Cyber-Attackers
From the thesis abstract: "A honeypot is a non-production system, design to interact with cyber-attackers to collect intelligence on attack techniques and behaviors. While the security community is reaping fruits of this collection tool, the hacker community is increasingly aware of this technology. In response, they develop anti-honeypot technology to detect and avoid honeypots. Prior to the discovery of newer intelligence collection tools, we need to maintain the relevancy of honeypot. Since the development of anti-honeypot technology indicates the deterrent effect of honeypot, we can capitalize on this deterrent effect to develop fake honeypot. Fake honeypot is real production system with deterring characteristics of honeypot that induces the avoidance behavior of cyber-attackers. Fake honeypots will provide operators with workable production systems under obfuscation of deterring honeypot when deployed in hostile information environment. Deployed in a midst of real honeynets, it will confuse and delay cyber-attackers. To understand the effects of honeypot on cyber-attackers to design fake honeypot, we exposed a tightly secured, self-contained virtual honeypot to the Internet over a period of 28 days. We conclude that it is able to withstand the duration of exposure without compromise. The metrics pertaining to the size of last packet suggested departure of cyber-attackers during reconnaissance."
Naval Postgraduate School (U.S.)
Lim, Sze Li Harry
2006-12
-
Systems Approach to Terrorism: Countering the Terrorism Training Subsystem
From the thesis abstract: "This study on terrorism training follows the logic that terrorism is a 'wicked problem' and there are various strategies to cope with it. Systems thinking is one of the coping strategies to address 'wicked problems.' A system is a whole composed of complex organized elements (subsystems) interacting with each other and with their environment. The stability of a system depends on its components' alignment. Misaligning one of its components, will destabilize, or even disrupt the whole system. In this regard, the study defines terrorism and terrorist organizations in systems terms, explains their components and interrelations, and concludes that the most important component of a terrorist system is the training subsystem. Thus it is important to understand how the subsystem functions in order to disrupt the whole system. The study reviews the types of terrorist training, how the terrorists and their organizations learn (process), what the terrorists learn (content), where the terrorists learn (location) and concludes that the internet is the new safe haven for terrorist training. It also demonstrates the adaptive capability of terrorist system moving from land-based to internet-based training. Almost every terrorist organization on the US [State] Department's designated terrorist organizations list exists on the Net. One example is the PKK (Kurdistan Workers Party) terrorist network. Its website network is analyzed by content and network structure using social network analysis software UCINET. The goal is to develop strategies to eliminate the web presence of the terrorist training subsystem."
Naval Postgraduate School (U.S.)
Celebi, Erdogan
2006-12
-
Applicability of Unmanned Aerial Systems to Homeland Defense Missions
From the thesis abstract: "Battlefield success of Unmanned Aerial Systems (UAS) prompted Department of Defense and Department of Homeland Security leaders to examine their possible applicability to homeland defense missions within the National Strategy for Homeland Security. The National Strategy for Homeland Security incorporates all levels of government to include law enforcement agencies and the military, the predominant owner and operator of UASs. The military, however, is restricted in its domestic role by the Posse Comitatus Act, and is therefore limited in its domestic employment of UASs. In order to determine the applicability of UASs to homeland defense missions, it is necessary to examine the capabilities of available UASs, to match them with mission requirements, and determine the legality of where they can be used and who can operate them. A policy that places combat UAS capability with Title 10 military forces and homeland defense mission capability with Title 32 and law enforcement agencies will fulfill the goals stated in the national strategy and function within the current legal framework."
Naval Postgraduate School (U.S.)
DeVane, John C.
2006-12
-
Cyber-Herding: Exploiting Islamic Extremists Use of the Internet
"The internet has many characteristics that support extremists' information operations, such as being able to reach large audiences. Yet the internet also has inherent weaknesses that can be exploited. One of these weaknesses is the ambiguous nature of the net. You trust that when you go to a website that it is legitimate. If it looks professional, you tend to believe that the site is real. However, criminals or terrorists could just as easily be running that website. The same is true when you chat with someone online. […]. Terrorist organizations also have an inherent weakness that can be exploited using the internet. This weakness is the decentralized nature of terrorist organizations. Many terrorist organizations that do not have state sponsorship organize and accomplish work utilizing social networks versus a hierarchy command structure. This only makes sense. Individuals engaged in criminal activities need to work with people they trust so they can accomplish their mission. In the physical world, social networks are very reliable. However, in the virtual world social networks can be exploited because personalities in the virtual world can be real or fictitious. In order to exploit these weaknesses, a cyber system that invisibly drives Islamic extremists from terrorist websites to covertly controlled websites can be developed. I will generically refer to this system as cyber-herding. "
Naval Postgraduate School (U.S.)
Moon, David B.
2007
-
Improving Military Change Detection Skills in a Virtual Environment: The Effects of Time, Threat Level, and Tutorials
From the thesis abstract: "The first one hundred days of combat are the most dangerous time for a soldier due to uncertainty and unfamiliarity with his area of operations. Developing a desktop virtual trainer for change detection could reduce the threat to soldiers by improving their ability to detect signals among the cluttered, noisy neighborhoods of the current operational environment. Building upon previous change detection and signal detection work, this thesis explores the use of Army Virtual Battlespace 2™ as a prototype-training tool for change detection. Leveraging an Army-owned distributable trainer would potentially benefit soldiers prior to deployment. This research team conducted an experiment that tested fifteen participants over four weeks. Each participant explored the virtual environment twelve times. Researchers analyzed correct detections, false alarms, user confidence, threat levels, and tutorial group assignment. This first attempt at developing a military-oriented virtual trainer resulted in statistically significant improvement in detection percentages, user confidence, and decay of false-alarm rates over time with p-values less than 0.01. The results showed no significance in the use of an in-simulation tutorial or target threat level. Future work should expand on this foundational research to determine whether the skills developed using this trainer transfer to real-world change detection."
Naval Postgraduate School (U.S.)
Caldwell, Jason C.; Stinchfield, Michael K.
2011-09
-
Residual Network Data Structures in Android Devices
From the thesis abstract: "The emergence and recent ubiquity of Smartphones present new opportunities and challenges to forensic examiners. Smartphones enable new mobile application and use paradigms by being constantly attached to the Internet via one of several physical communication media, e.g. cellular radio, WiFi, or Bluetooth. The Smartphone's storage medium represents a potential source of current and historical network metadata and records of prior data transfers. By using known ground truth data exchanges in a controlled experimental environment, this thesis identifies network metadata stored by the Android operating system that can be readily retrieved from the device's internal non-volatile storage. The identified network metadata can ascertain the identity of prior network access points to which the device associated. An important by-product of this research is a well-labeled Android Smartphone image corpus, allowing the mobile forensic community to perform repeatable, scientific experiments, and to test mobile forensic tools."
Naval Postgraduate School (U.S.)
Cardwell, Gregory S.
2011-09
-
Application of the Terrestar Satellite Constellation to the Global Initiative for Tracking Special and Nonproliferation Material
From the thesis abstract: "In an era distinguished by innovative communication technologies capable of linking with geosynchronous satellites, while being small enough to fit into a pocket of clothing, the modern battlefield commander and warfighter can know the precise location of surrounding friendly forces. This concept of communication involving satellites provides for a new tier of situational awareness in combat and noncombat environments, dating as far back as the Persian Gulf War. This tool altered the command and control element by improving the knowledge and certainty that this capability provided. Recent studies and experiments have demonstrated the applicability of these military systems to civil service as well. Space based situational awareness provide capabilities such as continuous over-the-horizon communications and position reporting of friendly assets. These capabilities have been available since the Persian Gulf War. System limitations include a lack of real-time image, terrain masking, and security. Until recently, the devices used for Friendly Force Tracking have been devices that rely on National Technical Means. However, the recent trend is to use commercially available technology to enable tracking of both friendly and enemy forces. This technology ranges from the use of GPS [Global Position System] equipped cell phones to satellites in LEO [Low Earth Orbit] such as Iridium and GlobalStar. Terrestar is a new company specializing in space technology and wireless communication devices. Additionally, TerreStar wireless communication devices are designed to use both cellular and satellite networks. This feature provides a redundant tracking method not otherwise available. This study includes an investigation into Terrestar tracking devices used to locate and monitor the position and movement of friendly forces."
Naval Postgraduate School (U.S.)
Camarena, Richard M.; Carcich, Andrew L.
2011-09
-
Does the Dragon Soar Higher than the Eagle?
From the thesis abstract: "Chinese economic penetration of Latin America has profoundly altered the economic and political relationships in the region. This thesis argues that while the growing relationship between China and Brazil has been beneficial for both countries, it is especially beneficial for China. While the Brazilian raw materials and agricultural industries have profited, the influx of finished Chinese products is making many Brazilian industries, especially textiles, uneconomical, and has raised fears that Brazil may contract the 'Dutch disease'--reliance on a few industries for export income. However, China has offset the historic political influence of the United States in the region, and holds out the prospect of being a strong sponsor of Brazil's ambitions to become an international political player commensurate with its growing regional economic and political importance. Latin American states are finding various ways to expand lines of communication and to collaborate with the Chinese, who are clearly set to play a major role in aid-giving worldwide. We must better understand our future competitor in order to develop our own strategy for engagement in Latin America."
Naval Postgraduate School (U.S.)
Bray, Erik K.
2011-09
-
Simulation Based Analysis of U.S. Army Watercraft Capabilities in a 2022 Foreign Humanitarian Assistance/Disaster Relief Operation
From the thesis abstract: "This thesis utilizes the operational context established by Expeditionary Warrior 2010 (EW10), a United States Marine Corps operational level seminar planning game, to analyze a 2022 United States Army Watercraft Foreign Humanitarian Assistance/Disaster Relief (FHA/DR) Operation. The EW10 Wargame was conducted over four days and in order to ensure complete analysis of the entire scenario within the time constraints, the composition of forces was explicitly defined. This thesis considers the full range of possible force compositions. A full functional and physical architecture is developed, using EW10 as an operational basis. Corresponding Measures of Outcome, Measures of Effectiveness, and Measures of Performance for U.S. Army Watercraft FHA/DR Operations are defined. The current U.S. Army Watercraft Master Plan is used to develop a 2022 U.S. Army Watercraft Force Structure, to include the integration of the Office of Naval Research's Transformable Craft (T-Craft). A discrete event simulation is developed using Imagine That's ExtendSim software to analyze the impact of variations in the projected force structure as well as the performance gains and losses associated with the introduction and removal of the T-Craft from the force structure. Simulation analysis indicates that, if the T-Craft is available in 2022, U.S. Army FHA/DR response forces should be defined by: 8 or more T-Craft, 4 or more Joint High Speed Vessels (JHSVs), and 4 or more Logistics Support Vessels. In the absence of T-Craft, the response force should be defined by: 7 or more JHSVs and 13 or more Landing Craft Utility 2000s."
Naval Postgraduate School (U.S.)
Beery, Paul T.
2011-09
-
Assessing Vulnerabilities in Interdependent Infrastructures Using Attacker-Defender Models
From the thesis abstract: "Our economic and social welfare depend on certain 'critical' infrastructures and key resources. Protecting these infrastructures is a challenge because they are complex, and as systems they are difficult to understand, predict and control. In addition, they do not operate in isolation, but are interdependent with other infrastructures. This presents a challenge for their modeling and analysis. Due to the complexity of modeling the operation of just a single infrastructure, most research to date has analyzed infrastructures in isolation. This thesis introduces a taxonomy of dependence relationships and incorporates these relationships into an attacker-defender model of interdependent infrastructure operation. We formulate and solve a sequence of models to illustrate how dependence relationships between infrastructures create vulnerabilities that are not apparent in single-infrastructure models, and we use the results to assess the consequences of disruptions to a system of infrastructures. We provide complete documentation for how to apply these techniques to real infrastructure problems and include a discussion of the necessary assumptions, as well as the pros and cons of our methods. Finally, we present examples of how to provide relevant, understandable results to help decision makers, such as where to make limited investments to increase resilience."
Naval Postgraduate School (U.S.)
Dixon, Cory A.
2011-09
-
Developing a Software Model to Assess a Nation's Capability to Conduct Sustained, Offensive Cyber Warfare
From the thesis abstract: "This research provides a Situational Influence Assessment Module (SIAM) software model for assessing the capability of a country to conduct sustained, offensive cyber warfare. The SIAM Cyber Warfare Capability Model identifies a process to quantify the baseline information needed to evaluate a complex problem. The model is a tool and allows analysts to understand the reasoning behind the assessments made by the model. The SIAM Cyber Warfare Capability Model is meant to be used as a mechanism to examine in detail the factors that should indicate a country's cyber warfare capabilities. The SIAM Cyber Warfare Capability Model is a four level, hierarchical model that relies on user-defined relationships (links) to inform and assess whether a country has the capability to conduct, sustained offensive cyber warfare. The model requires the user provide a confidence value for the information contained within the Initial Nodes at the lowest level, level four, which will propagate up through the model based on user defined link strengths. The model accounts for the cumulative effect that multiple inputs may have on a nation state's cyber warfare capability through Causal Strengths (CAST) Logic. The analyst is also able to alter the information contained in the level four nodes along with the strength of the links, as more information is made available. This provides for a readily updateable model that considers multiple indicators and relationships. [...] The sponsor used the Cyber Warfare Capability Model to account for resources in a separate model that analyzes a state's cyber program by taking a capability equals sophistication times resources approach. We view this feedback and subsequent use of our model in a separate product as a validation of the methodology employed in the Cyber Warfare Capability Model."
Naval Postgraduate School (U.S.)
Cummings, Brian D.; McElheny, Aric L.
2011-09
-
Adaptive Discrete Event Simulation for Analysis of Harpy Swarm Attack
From the thesis abstract: "Harpy swarm attacks are a new type of threat designed for Suppression of Enemy Air Defenses. Research into combating Harpy swarm attacks has been conducted but the simulation software used to date, Naval Simulation System, is inadequate for future research. A new and mission-focused simulation tool is necessary in order to advance research in defensive tactics against Harpy and other unmanned aerial vehicle threats (UAV). This research develops a simulation model for a Harpy swarm attack using Simkit to meet the need for a mission specific analytical tool. The base model consists of a user-defined Harpy patrol area and a ship traversing the area on a course and speed also defined by the user. A total of 16 parameters are defined and implemented. The model records the time any Harpy impacts the ship to provide data for the response variable, the number of Harpy hits on the ship. Main effect and full factorial regressions were performed as well as a partition tree to determine which parameters had the most significance on the number of Harpies which hit the ship. These model characteristics and future enhancements will provide researchers the ability to assess alternative anti-UAV swarm tactics."
Naval Postgraduate School (U.S.)
Cobb, Brandon J.
2011-09
-
Comparative Analysis of the Snort and Suricata Intrusion-Detection Systems
From the thesis abstract: "Our research focuses on comparing the performance of two open-source intrusion-detection systems, Snort and Suricata, for detecting malicious activity on computer networks. Snort, the de-facto industry standard open-source solution, is a mature product that has been available for over a decade. Suricata, released two years ago, offers a new approach to signature-based intrusion detection and takes advantage of current technology such as process multithreading to improve processing speed. We ran each product on a multi-core computer and evaluated several hours of network traffic on the NPS [Naval Postgraduate School] backbone. We evaluated the speed, memory requirements, and accuracy of the detection engines in a variety of experiments. We conclude that Suricata will be able to handle larger volumes of traffic than Snort with similar accuracy, and thus recommend it for future needs at NPS since the Snort installation is approaching its bandwidth limits."
Naval Postgraduate School (U.S.)
Albin, Eugene
2011-09
-
Infrastructure Suitability Assessment Modeling for Cloud Computing Solutions
From the thesis abstract: "Maturing virtualization in information technology systems has enabled increased implementations of the cloud com-puting paradigm, dissolving the need to co-locate user and computing power by providing desired services through the network. This thesis researches the support that current network modeling and simulation applications can provide to IT [Information Technology] projects in planning, implementing and maintaining networks for cloud solutions. A problem-appropriate do-main model and subsequent requirements are developed for the assessment of several network modeling and simula-tion tools, which leads to the identification of a capability gap precluding the use of such tools in early stages of cloud computing projects. Consequently, a practical, modular designed methodology is proposed to measure the essential properties necessary for developing appropriate cloud computing network traffic models. The conducted proof-of-concept experiment applied to a virtual desktop environment finds the proposed methodology suitable and problem-appropriate, and results in recommended steps to close the identified capability gap."
Naval Postgraduate School (U.S.)
Fehse, Carsten
2011-09
-
Comparison of Data Development Tools for Populating Cognitive Models in Social Simulation
From the thesis abstract: "The United States is engaged in a new type of warfare. Defeating the enemy is now predicated on winning over local populations. To win these groups, commanders need to know what responses to expect for various operations in particular locations. Social simulations are a promising means of modeling these reactions, and there are several current methods used to populate these simulations with agents representative of a specific society. These methods, however, often require the input of subject matter experts and are costly in price and time. This thesis examines the simplification and automation of the agent instantiation process by conducting a usability study of two data development tools currently under consideration by the U.S. Army and TRAC-MTRY [Training and Doctrine Command Analysis Center-Monterey]. The tools, a survey data case file generator developed at TRAC-MTRY and a text analysis tool (STANLEY) [Sandia's Text ANaLysis Extensible librarY] developed by Sandia National Laboratory, were examined in separate manners, and the results were encouraging. The survey tool was tested to validate in a practical manner its generated case files with respect to simulation output and real-world surveys. STANLEY was evaluated by scoring sentiment in a document corpus and attempting to correlate those scores to a real world issue. Results of the study indicate that the survey data tool generated case files of adequate quality to instantiate social simulations, potentially minimizing SME [Subject Matter Expert] requirements and costs. Technical limitations precluded STANLEY from returning enough data for sufficient correlation comparison, although the results indicate the tool has potential."
Naval Postgraduate School (U.S.)
McKaughan, Daniel C.
2011-09
-
Comparative Analysis of Emergency Response Operations: Haiti Earthquake in January 2010 and Pakistan's Flood in 2010
From the thesis abstract: "This study explores HA/DR [Humanitarian Assistance/Disaster Relief] operations and the associated response of the international community during the recent earthquake in Haiti and flood in Pakistan in 2010. A powerful earthquake of magnitude 7.0 hit Haiti on January 12, causing great damage and mass casualties. The international community responded swiftly and took over relief efforts in the country saving a lot of lives. Handsome donations were also given and committed. Pakistan suffered heavy floods that started in the end of July 2010 and affected nearly the entire country. Loss of life was not very great, but infrastructure damage and people subsequently affected surpassed the combined total of the 2004 Tsunami, Haiti earthquake and 2005 South Asia earthquake. During this disaster the international community, particularly volunteer technologists, were not mobilized the way they were in Haiti. Donations were made late and comparatively slow. No single country can handle a large-scale natural disaster like the two exemplar cases chosen for this thesis, and hence the role of the international community is very important. Such response has not been equitable in the past and it is the goal of this research to find ways to make it more equitable in the future."
Naval Postgraduate School (U.S.)
Niazi, Javed Iqbal Khan
2011-09
-
Virtual Cloud Computing: Effects and Application of Hastily Formed Networks (HFN) for Humanitarian Assistance/Disaster Relief (HA/DR) Missions
From the thesis abstract: "Catastrophic events occur throughout the earth and first responders can benefit from improved Command and Control (C2). Currently, military C2 capabilities, though adequate in some settings, can be enhanced using virtual applications. This thesis seeks as its goals to analyze and transform present Hastily Formed Network (HFN) capabilities into a virtual HFN system, controlling for technology. We analyze this through leveraging the Naval Postgraduate School (NPS) HFN and Virtualization and Cloud Computing labs. The independent variables are defined as the current HFN architecture and Virtualization and Cloud Computing lab, and the dependent variables are defined as cost and hardware. Through this research effort, we explore, and perhaps improve, HFN capabilities through available virtualization technologies. The additional technologies applied to the current HFN system may aid in the speed of connectivity to the World Wide Web and other mission-critical resources, thus promoting an enhanced C2 capability, and in turn saving lives during HA/DR [Humanitarian Assistance/Disaster Relief] missions. This research points the way for future researchers to continue leveraging virtualization technologies and cloud computing in HA/DR settings. The thesis research conducted and distributed is in the area of networking and applied sciences in technology. The methodology and practices during the research utilized cutting-edge technology while testing performance capabilities of virtualized systems. The information gathering and research phase of this thesis directly applies elements of information systems analysis."
Naval Postgraduate School (U.S.)
Morris, Mark K.
2011-09
-
How Can Officers Be Better Prepared to Interact with Non-Governmental Organizations in a Post-Conflict Environment?
From the thesis abstract: "This thesis examines the state of relations between the military and non-governmental organizations (NGOs). It argues that the military--NGO relationship requires improvement. The involvement of the military in post-conflict reconstruction efforts is required due to the tenuous security situation and an increased in military--NGO cooperation/coordination is necessary in order to achieve stabilization of the post-conflict society. This thesis supports the argument that an effective way of increasing cooperation/coordination is by improving the preparation of military officers who are expected to operate in that cooperative environment. This research will first consider the effectiveness of existing practices for preparing military officers for NGO interaction and will provide recommendations for improving this preparation through the utilization of an anonymous survey provided to a cross-organizational audience. The lessons learned as a result of this research will provide a foundation for military decision-makers to properly allocate funding towards these efforts."
Naval Postgraduate School (U.S.)
Matvay, David M., Jr.
2011-09
-
Effective Noise Filtering Method for Mine Detection
From the thesis abstract: "Automatic detection of sea mines in coastal regions is difficult due to highly varying sea bottom conditions present in the underwater environment. Detection systems must be able to discriminate objects that vary in size, shape, and orientation from naturally occurring and man-made clutter. Additionally, these automated systems must be computationally efficient to be incorporated into Unmanned Aerial Vehicle (UAV) sensor systems characterized by high sensor data-rates and limited processing abilities. Commonly used noise filters largely depend on the window (or neighborhood) size, which makes the mine detection ineffective. Using the bi-dimensional empirical mode decomposition (BEMD) analysis, an effective, robust sea mine detection system can be created. A family of decomposed images is generated and applied to optical lidar image data from the Rapid, Overt, Airborne, Reconnaissance (ROAR) experiment supplied by Naval Surface Warfare Center, Panama City. These decompositions project key image features, geometrically defined structures with orientations, and localized information into distinct orthogonal components or feature subspaces of the image. Application of the BEMD method to the analysis on side scan sonar data is also provided. Accurate detection and classification of mines is time consuming and requires divers or Autonomous Underwater Vehicles (AUV) in the water. The navy continues to pursue more expedient methods in mine countermeasures, and with airborne lidar, a surf zone (SZ) and landing zone can be quickly surveyed for possible mines. In the near surf zone, all possible mines can be quickly neutralized by dropping guided munitions, eliminating the need to send divers or AUVs to verify contacts. Still, the need for improved methods of detection and classification is needed. BEMD, a relatively new method of signal analysis developed about fifteen years ago, was tested on lidar imagery from the ROAR experiment to look for any improvements in detecting and classifying mines."
Naval Postgraduate School (U.S.)
Hong, Bryan Y.
2011-09
-
Improving Health-Care Delivery for Post-Traumatic Stress Disorder: An Interrelated Approach Leveraging Systems Engineering and Optimization
From the thesis abstract: "Post-Traumatic Stress Disorder (PTSD), major depression, anxiety disorders, and other post-deployment adjustment difficulties affect a significant number of veterans returning from Operation Iraq Freedom and Operation Enduring Freedom. To contend with this new influx of veterans suffering from the psychological aftermath of military combat, the VA [U.S. Department of Veteran Affairs] has been proactive, including commissioning this study of their PTSD health-care delivery system. Its objective is to provide the best care, in the most efficient manner possible to as many affected veterans as possible. This study examines PTSD health-care delivery from a systems engineering perspective. It employs state-of-the-art tools such as: ExtendSim modeling and simulation software, and JMP [statistical software, pronounced 'jump'] analysis software. The resulting models produce a set of eight optimized system factors, which maximize the desirability of four system performance measures that define the efficiency, capacity, and timeliness of the system. We argue that these models can and should be used as a platform for future work in this area of study."
Naval Postgraduate School (U.S.)
McKenzie, Scott Alexander
2011-09
-
Simple Messaging and Collaboration System for Heterogeneous Organizations Operating in Disaster Environments
From the thesis abstract: "A novel communication system for use by a wide variety of first responders in disaster response is described. The system is based primarily on SMS [Short Message Service] messaging technologies and either indigenous mobile phone service providers or mobile phone service brought in via cellular-on-wheels (COWs), UAVs [Unmanned Aerial Vehicles], rapidly deployed towers, etc. End users use either their own cell phones, running a native SMS application, or low-cost phones that are distributed by a large nongovernmental organization, such as UN OCHA [United Nations Office for the Coordination of Humanitarian Affairs]. If a proprietary network is set up, SIM [Subscriber Identity Module] cards are distributed to end users to allow access to the network, or administrators will explicitly allow access via a phone's IMEI [International Mobile Equipment Identifier] number or other access control methods."
Naval Postgraduate School (U.S.)
Meyer, Ramsey
2011-09