skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Award ID contains: 1853953

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. A significant portion of organizations and applications host client facing servers on cloud-based systems. As the first line of access into a system’s services, these clientfacing servers have a significant attack surface from network adversaries. Once compromised, these systems may be used to send spam, mine crypto, launch DDoS attacks, or used for other nefarious purposes. We propose an adaptive moving target defense that uses game theory to optimize the security and cost to the cloud system. This system leverages the fault-tolerant capabilities of cloud systems with large numbers of client facing servers and the virtualization of these client facing servers by strategically crashing random systems. As a result, an attacker who has compromised a system loses access to it and incurs the cost of having to re-compromise the system once they notice it has been lost. This approach drastically limits the amount of time that an attacker can utilize compromised systems and raises the overall investment required for that time. We have demonstrated via simulation a 90% reduction in the amount of time that an attacker has control over a compromised system for realistic scenarios based on previous data collection of live systems. This approach is agnostic to the method of compromise, so it is even effective against zero-day attacks. 
    more » « less
  2. In the growing era of smart cities, data-driven decision-making is pivotal for urban planners and policymakers. Crowd-sourced data is a cost-effective means to collect this information, enabling more efficient urban management. However, ensuring data accuracy and establishing trustworthy “Ground Truth” in smart city sensor data presents unique challenges.Our study contributes by documenting the intricacies and obstacles associated with overcoming MAC randomization, sensor unpredictability, unreliable signal strength, and Wi-Fi probing inconsistencies in smart city data cleaning.We establish a framework for three different types of experiments: Counting, Proximity, and Sensor Range. Our novel approach incorporates the spatial layout of the city, an aspect often overlooked. We propose a database structure and metrics to enhance reproducibility and trust in the system.By presenting our findings, we aim to facilitate a deeper understanding of the nuances involved in handling sensor data, ultimately paving the way for more accurate and meaningful data-driven decision-making in smart cities. 
    more » « less