scispace - formally typeset
Search or ask a question
Author

George Rush

Bio: George Rush is an academic researcher from Missouri University of Science and Technology. The author has contributed to research in topics: Game theory & Network security. The author has an hindex of 4, co-authored 5 publications receiving 86 citations.

Papers
More filters
Proceedings ArticleDOI
11 Jul 2015
TL;DR: This paper proposes the Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES), a framework designed to coevolve attacker and defender agent strategies and evaluate potential solutions with a custom, abstract computer network defense simulation.
Abstract: Predicting an adversary's capabilities, intentions, and probable vectors of attack is in general a complex and arduous task. Cyber space is particularly vulnerable to unforeseen attacks, as most computer networks have a large, complex, opaque attack surface area and are therefore extremely difficult to analyze. Abstract adversarial models which capture the pertinent features needed for analysis, can reduce the complexity sufficiently to make analysis feasible. Game theory allows for mathematical analysis of adversarial models; however, its scalability limitations restrict its use to simple, abstract models. Computational game theory is focused on scaling classical game theory to large, complex systems capable of modeling real-world environments; one promising approach is coevolution where each player's 'fitness is dependent on its adversaries. In this paper, we propose the Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES), a framework designed to coevolve attacker and defender agent strategies and evaluate potential solutions with a custom, abstract computer network defense simulation. By performing a qualitative analysis of the result data, we provide a proof of concept for the applicability of coevolution in planning for, and defending against, novel attacker strategies in computer network security.

39 citations

Proceedings ArticleDOI
23 May 2010
TL;DR: A routing algorithm which forms a series of social groups which accurately indicate a node’s regular contact patterns while dynamically shifting to represent changes to the social environment is introduced.
Abstract: The patterns of movement used by Mobile Ad-Hoc networks are application specific, in the sense that networks use nodes which travel in different paths. When these nodes are used in experiments involving social patterns, such as wildlife tracking, algorithms which detect and use these patterns can be used to improve routing efficiency. The intent of this paper is to introduce a routing algorithm which forms a series of social groups which accurately indicate a node’s regular contact patterns while dynamically shifting to represent changes to the social environment. With the social groups formed, a probabilistic routing schema is used to effectively identify which social groups have consistent contact with the base station, and route accordingly. The algorithm can be implemented dynamically, in the sense that the nodes initially have no awareness of their environment, and works to reduce overhead and message traffic while maintaining high delivery ratio.

32 citations

Proceedings ArticleDOI
01 Dec 2010
TL;DR: A routing algorithm is introduced which forms a series of social groups which accurately indicate a node's regular contact patterns while dynamically shifting to represent changes to the social environment.
Abstract: The patterns of movement used by Mobile Ad-Hoc networks are application specific, in the sense that networks use nodes which travel in different paths. When these nodes are used in experiments involving social patterns, such as wildlife tracking, algorithms which detect and use these patterns can be used to improve routing efficiency. The intent of this paper is to introduce a routing algorithm which forms a series of social groups which accurately indicate a node's regular contact patterns while dynamically shifting to represent changes to the social environment. With the social groups formed, a probabilistic routing schema is used to effectively identify which social groups have consistent contact with the base station, and route accordingly. The algorithm can be implemented dynamically, in the sense that the nodes initially have no awareness of their environment, and works to reduce overhead and message traffic while maintaining high delivery ratio.

18 citations

Proceedings ArticleDOI
21 Jul 2014
TL;DR: This paper has built a distributed framework based on software agents which can manage system roles, automate data collection, analyze results, and run new experiments without human intervention, and provides a detailed description of that model.
Abstract: Cyber security has quickly become an overwhelming challenge for governments, businesses, private organizations, and individuals. In an increasingly connected world, the trend is for resources to be accessible from anywhere at any time. Greater access to resources implies more targets and potentially a larger surface area for attacks, which makes securing systems more difficult. Automated and semi-automated solutions are needed to keep up with the deluge of modern threats, but designing such systems requires a distributed architecture to support development and testing. Several such architectures exist, but most only focus on providing a platform for running cyber security experiments as opposed to automating experiment processes. In response to this need, we have built a distributed framework based on software agents which can manage system roles, automate data collection, analyze results, and run new experiments without human intervention. The contribution of this work is the creation of a model for experiment automation and control in a distributed system environment, and this paper provides a detailed description of our framework based on that model.

4 citations

ReportDOI
03 Dec 2015
TL;DR: In this paper, the authors propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation.
Abstract: Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and control in a distributed environment. Predictive analysis of adversaries is another thorny issue in cyber security. Game theory can be used to mathematically analyze adversary models, but its scalability limitations restrict its use. Computational game theory allows us to scale classical game theory to larger, more complex systems. In the second paper, we propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation. The third paper is a continuation of the CANDLES project in which we rewrote key parts of the framework. Attackers and defenders have been redesigned to evolve pure strategy, and a new network security simulation is devised which specifies network architecture and adds a temporal aspect. We also add a hill climber algorithm to evaluate the search space and justifymore » the use of a coevolutionary algorithm.« less

2 citations


Cited by
More filters
Journal ArticleDOI
07 Nov 2011
TL;DR: A comprehensive survey on the MSN specifically from the perspectives of applications, network architectures, and protocol design issues is presented.
Abstract: The mobile social network (MSN) combines techniques in social science and wireless communications for mobile networking The MSN can be considered as a system which provides a variety of data delivery services involving the social relationship among mobile users This paper presents a comprehensive survey on the MSN specifically from the perspectives of applications, network architectures, and protocol design issues First, major applications of the MSN are reviewed Next, different architectures of the MSN are presented Each of these different architectures supports different data delivery scenarios The unique characteristics of social relationship in MSN give rise to different protocol design issues These research issues (eg, community detection, mobility, content distribution, content sharing protocols, and privacy) and the related approaches to address data delivery in the MSN are described At the end, several important research directions are outlined

263 citations

Journal ArticleDOI
TL;DR: A coalitional game-theoretic framework is developed to devise social-tie-based cooperation strategies for D2D communications and results corroborate that the proposed mechanism can achieve significant performance gain over the case without D1D cooperation.
Abstract: Thanks to the convergence of pervasive mobile communications and fast-growing online social networking, mobile social networking is penetrating into our everyday life. Aiming to develop a systematic understanding of mobile social networks, in this paper we exploit social ties in human social networks to enhance cooperative device-to-device (D2D) communications. Specifically, as handheld devices are carried by human beings, we leverage two key social phenomena, namely social trust and social reciprocity, to promote efficient cooperation among devices. With this insight, we develop a coalitional game-theoretic framework to devise social-tie-based cooperation strategies for D2D communications. We also develop a network-assisted relay selection mechanism to implement the coalitional game solution, and show that the mechanism is immune to group deviations, individually rational, truthful, and computationally efficient. We evaluate the performance of the mechanism by using real social data traces. Simulation results corroborate that the proposed mechanism can achieve significant performance gain over the case without D2D cooperation.

244 citations

Journal ArticleDOI
TL;DR: This paper distinguishes MSNs from conventional social networks and provides a comprehensive survey of MSNs with regard to platforms, solutions, and designs of the overall system architecture.
Abstract: Mobile social networks (MSNs) have become increasingly popular in supporting many novel applications since emerging in the recent years. Their applications and services are of great interest to service providers, application developers, and users. This paper distinguishes MSNs from conventional social networks and provides a comprehensive survey of MSNs with regard to platforms, solutions, and designs of the overall system architecture. We review the popular MSN platforms and experimental solutions for existing MSN applications and services and present the dominant mobile operating systems on which MSNs are implemented. We then analyze and propose the overall architectural designs of conventional and future MSN systems. In particular, we present the architectural designs from two perspectives: from the client side to the server side, and from the wireless data transmission level to the terminal utilization level. We further introduce and compare the unique features, services, and key technologies of two generations of architectural designs of MSN systems. Then, we classify the existing MSN applications and propose one special form of MSN, i.e., vehicular social network, and demonstrate its unique features and challenges compared with common MSNs. Finally, we summarize the major challenges for on-going MSN research and outline possible future research directions.

154 citations

Journal ArticleDOI
TL;DR: A scalable video coding sharing scheme based on user's social attributes makes video distribution more flexible at the edge of mobile network through collaboration among users, and effectively reduces transmission energy consumption of transmitters.
Abstract: To relieve the current overload of cellular networks caused by the continuously growing multimedia service, mobile edge collaboration, which exploits edge users to distribute videos for base station (BS), provides an effective way to share the heavy BS load. With the emergence of mobile edge technologies for Internet-of-Things applications, such as device to device and machine to machine, how to exploit users’ social characteristics and mobility to minimize the number of transmissions of BS and how to improve the quality of experience of users have become the key challenges. In this paper, we study two aspects that are critical to these issues. One is the two-step detection mechanism, namely the establishment of virtual communities and collaborative clusters. Specifically, we take into consideration user preference for content and location. First of all, a virtual community is established, which exploits the coalition game based on the user's preference list to dynamically divide users into multiple communities. Then, to take full advantage of the temporary link established between users, a grid-based clustering method is proposed to manage the video requesting users. On the other hand, we propose a scalable video coding sharing scheme based on user's social attributes. This approach makes video distribution more flexible at the edge of mobile network through collaboration among users, and effectively reduces transmission energy consumption of transmitters. Numerical results show that the proposed mechanism can not only effectively alleviate the BS load, but also dramatically improve the reliability and adaptability of video distribution.

90 citations

Journal ArticleDOI
TL;DR: Simulation results indicate that the proposed bandwidth allocation algorithm is able to rationally form clusters among mobile users and thus significantly increase the throughput and bandwidth efficiency of the network.
Abstract: Data collection has become easy due to the rapid development of both mobile devices and wireless networks. In each second, numerous data are generated by user devices and collected through wireless networks. These data, carrying user and network related information, are invaluable for network management. However, they were seldom employed to improve network performance in existing research work. In this article we propose a bandwidth allocation algorithm to increase the throughput of cellular network users by exploring user and network data collected from user devices. With the aid of these data, users can be categorized into clusters and share bandwidth to improve the resource utilization of the network. Simulation results indicate that the proposed scheme is able to rationally form clusters among mobile users and thus significantly increase the throughput and bandwidth efficiency of the network.

80 citations