D
D. Sterne
Researcher at SPARTA, Inc.
Publications - 13
Citations - 217
D. Sterne is an academic researcher from SPARTA, Inc.. The author has contributed to research in topics: Intrusion detection system & Scalability. The author has an hindex of 8, co-authored 13 publications receiving 216 citations.
Papers
More filters
Journal ArticleDOI
Cyber defense technology networking and evaluation
Ruzena Bajcsy,Terry Benzel,Matt Bishop,B. Braden,Carla E. Brodley,Sonia Fahmy,Sally Floyd,Wes Hardaker,Anthony D. Joseph,George Kesidis,Karl N. Levitt,B. Lindell,Peng Liu,David J. Miller,Russ Mundy,Clifford Neuman,Ron Ostrenga,Vern Paxson,P. Porras,Catherine Rosenberg,J. D. Tygar,S. Shankar Sastry,D. Sterne,S. F. Wu +23 more
TL;DR: Creating an experimental infrastructure for developing next-generation information security technologies and assessing the impact it has on existing and new technologies is being proposed.
Proceedings ArticleDOI
Intrusion Detection System Resiliency to Byzantine Attacks: The Case Study of Wormholes in OLSR
John S. Baras,Svetlana Radosavac,George Theodorakopoulos,D. Sterne,Peter Budulas,Richard D. Gopaul +5 more
TL;DR: A mathematical framework for obtaining performance bounds of Byzantine attackers and the Intrusion Detection System (IDS) in terms of detection delay is proposed and provided for efficient identification of the worst attacks and damages that the attackers can achieve, as well as the best response of the defenders.
Proceedings ArticleDOI
In-Band Wormholes and Countermeasures in OLSR Networks
Peter Kruus,D. Sterne,Richard D. Gopaul,M. Heyman,Brian Rivera,Peter Budulas,Brian B. Luu,T. Johnson,Natalie Ivanic,G. Lawler +9 more
TL;DR: The conditions under which an in-band wormhole will collapse and how it can be made collapse resilient are explained and wormhole gravitational analysis, a technique for comparing the effect of wormholes on the network is presented.
Justification and Requirements for a National DDoS Defense Technology Evaluation Facility
TL;DR: Distributed Denial of Service (DDoS) attacks pose a severe threat to the nation's ability to conduct business, defend itself, and provide vital government services to its citizens, and can only be addressed through substantial and coordinated efforts by government and industry.
Proceedings ArticleDOI
A stochastic approximation approach for improving intrusion detection data fusion structures
TL;DR: The main contributions of this paper are to identify ID structure design requirements and formulate them as objective functions and constraints, adapt a multi-objective optimization framework to the formation of ID structures and provide indicative results concerning the quality of these structures with respect to the ID design requirements.