scispace - formally typeset
Search or ask a question
Author

Johan Sigholm

Bio: Johan Sigholm is an academic researcher from Swedish National Defence College. The author has contributed to research in topics: Military technology & Network topology. The author has an hindex of 5, co-authored 19 publications receiving 149 citations.

Papers
More filters
01 Jan 2015
TL;DR: In this paper, five technology forecast reports from the Fraunhofer Institute have been reviewed by staff at the Department of Military-Technology at the Swedish Defence University and the task given by the Swedish...
Abstract: Five technology forecast reports from the Fraunhofer Institute have been reviewed by staff at the Department of Military-Technology at the Swedish Defence University. The task given by the Swedish ...

1 citations

01 Jan 2007
TL;DR: The architecture includes functionality for flexible network model assessment, using a method for versatile comparison between off-line database models and real-world models, and provides an extension of an existing vendor-neutral enterprise network management and provisioning system NETadmin.
Abstract: This Master's Thesis describes the design and development of an architecture for automated network node discovery and topology analysis, implemented as an extension to the network management and provisioning system NETadmin. The architecture includes functionality for flexible network model assessment, using a method for versatile comparison between off-line database models and real-world models. These models are populated by current node data collected by network sensors.The presented architecture supports (1) efficient creation and synchronization of network topology information (2) accurate recognition of new, replaced and upgraded nodes, including rogue nodes that may exhibit malicious behavior, and (3) provides an extension of an existing vendor-neutral enterprise network management and provisioning system.An evaluation of the implementation shows evidence of accurate discovery and classification of unmatched hosts in a live customer production network with over 400 nodes, and presents data on performance and scalability levels.The work was carried out at Netadmin System i Sverige AB, in Linkoping, Sweden.

1 citations

01 Jan 2007
TL;DR: An architecture for versatile network discovery and analysis, which supports accurate recognition of new, replaced and upgraded nodes, including rogue nodes that may exhibit malicious behavior, and provides an extension of an existing vendor-neutral enterprise network management and provisioning system developed at Netadmin Systems AB.
Abstract: Most existing network management systems have partial support for network discovery and topology analysis, but are usually either vendor-specific or lack functionality for a flexible network model comparison. We posit an architecture for versatile network discovery and analysis, which supports (1) efficient creation and synchronization of network topology information (2) accurate recognition of new, replaced and upgraded nodes, including rogue nodes that may exhibit malicious behavior, and (3) provides an extension of an existing vendor-neutral enterprise network management and provisioning system developed at Netadmin Systems AB. The approach described in this paper is a step towards a more flexible way of tackling the increasingly difficult problem of node discovery and topology analysis in enterprise networks. An initial evaluation of our implementation shows evidence of accurate discovery and classification of unmatched hosts in a live customer production network with over 400 nodes, and presents data on performance and scalability levels.

1 citations

Proceedings ArticleDOI
04 Mar 2023
TL;DR: In this paper , the authors present an analysis of four reference architectures of GSaaS. On the basis of this systems engineering analysis, a cybersecurity analysis of the critical nodes will be carried out through the attack tree method.
Abstract: As the Ground Station as a Service (GSaaS) paradigm transforms space infrastructure operations, new attack surface emerges for malicious actors. While the space community generally refers to GSaaS as a singular model, there are several flavors of these systems. After a description of the general GSaaS network's basic structure, this paper presents an analysis of four reference architectures of GSaaS. On the basis of this systems engineering analysis, a cybersecurity analysis of the critical nodes will be carried out through the attack tree method. Later the cybersecurity implication both of technical and strategic characteristic of GSaaS networks will be discussed and put in relation with the current state of space cyberwarfare landscape.

Cited by
More filters
Journal Article
TL;DR: The Commission's report really does add enormous amounts of history to the sound bites and 30-second visuals that have pervaded politics and the world assessment of the US since that time.
Abstract: Twenty-five years ago, as an American GP living and practising in Wales, I would watch BBC sports programmes, such as darts and bowls and snooker, all unknown to me and, therefore, fascinating. I always found it odd — pairings such as Scotland (or Wales) versus The Rest of the World. It either seemed overly ambitious for Scotland or slim pickings for the rest of the world. After the recent US presidential election, it appears as if it will continue to be the US versus The Rest of the World. Three books might help you, who are of ‘the rest of the world’, begin to grapple with what is going on in the US. Written from the short, medium, and long view, each has a somewhat parochial twist. Each also, however, contains a great deal of useful history. The 9/11 Commission Report refutes the old saw that nothing good can be written by a committee. The report is a remarkable book and its recent nomination as a finalist for the National Book Award is a first for a government document, and well deserved. What is contained in this report is well known by most of us — the cast of characters has been in the news for over 3 years. And the sequence of events and many of the details that were gleaned from the ongoing hearings have been contained in news stories, long and short. However, to have published what is known until this point in a single narrative, which is at once accessible and clearly written, is a truly historical achievement. Reading the events of the day — regarding the planes that crashed in the city of New York, as the rescue squads from police and fire departments move into place and act — is both familiar and detailed in a way that helps us understand better than I would ever have imagined the why and how of all the death and destruction. So much about those days have been parsed into documentaries — long analyses of causation of issues, like why the towers fell — that one would think that everything that could be written had been. But the Commission's report really does add enormous amounts of history to the sound bites and 30-second visuals that have pervaded politics and the world assessment of the US since that time. The report deals extensively and thoughtfully with the history of Islam, both ancient and recent, and describes the history of terrorism as it evolved from highjackings of the 1970s to the use of bombs and targeted destruction of military targets in the late 1980s and 1990s. Events that occurred in the time that preceded the attacks of 9/11 are written in a way that shows the convergence of intelligence reports, a long history of threats from Bin Laden, and many alerts and warnings (‘the system was blinking red’ in the words of Tenet, CIA director). The information about the movements of the terrorists in their planning and the worldwide involvement of cells, support systems, and finances makes it clear that these events were truly the result of a network that reaches virtually everywhere. After the attacks, reading of the efforts of the fire, police, and other rescue squads in New York adds specifics that are terrible and remarkable. On 9/11, I ran up and down the stairs between patients to watch on television as it was all happening. All of us who watched that day wondered what those people who were clearly doomed were thinking, feeling, and seeing. Their actual words in this report are not fiction, they are the words, for most the last words, of people who died as we watched. Their words are the hardest part of this long, detailed report to deal with. Much of the final third of the report is devoted to what a fire captain friend of mine once called a PFE — a post-fire evaluation — which he mandated for his squad after every fire. In a PFE, the entire squad reconstructed, relived, and discussed the events to see what could be improved next time. The 9/11 Commission engaged in a world-scale PFE. Although all US politicians state that they intend to follow the recommendations of The 9/11 Commission Report, the backing and filling is already well underway. What politician, for example, is going to agree that major conurbations, and political and tactical targets should receive preference over their hometown fire departments and that homeland security money should ‘not be used as a pork barrel’? Rather than bringing a grieving country together in a way that will make such events unlikely to happen again, the reactions from the report have begun to cleave along party lines once again. The 9/11 Commission was almost unique in its thoroughness, transparency, and its ability to focus on the real issue of terror and lawlessness. However, the extent to which a violent stateless ideology has negatively affected the tolerance of differences, the sense of community, and the level of civic discourse in the US means that terrorism has affected our neighborhoods as much as it has affected our country. And fear rather than determination, despite the President's stump speech, has become the dominant emotion. Robert Byrd, from his 45-year perspective in the US Senate, understands that cheques and balances are essential to avoid tragedy, even if they, at times, impede progress. His book, Losing America, contains several ‘under-the-table’ looks at Congress and the manipulations and arrogance of the coterie of ideologues who surround George W. Bush. Byrd, from the Southern tradition of politeness and respect, which often cloaks bar-room politics, is steeped in the history of the institution of the Senate. He is personally offended by Bush's lack of interest or curiosity in the legislative process prior to 9/11, and his dishonesty and deception afterwards. Byrd's address to the Senate on the eve of the war on Iraq was widely quoted and is contained in this book. While people marching in the streets made headlines, it was an 85-year-old senator, not previously known as an outraged progressive, who took on both the Administration for its hypocrisy and many of his colleagues for their lack of courage and principle. He voted against the war and continues to point out the dishonesty of the people who guide it. The book reads with a sensibility from another age. Although his own history is certainly not without problems, Senator Byrd's belief in the true democratic process, rather than the gun-barrel approach of George W. Bush, should be given the respect that he, and it, deserve. Arthur Schlesinger Jr has been writing history since 1946 and has Pulitzer prizes to prove he does it well. His voice is considered, thoughtful, and scholarly — as one might expect from a historian and distinguished teacher. Toward the end of his book War and the American Presidency, however, Schlesinger's voice rises with outrage at those who surround and influence George W. Bush, the ‘small group of Messianic statesman whose self righteousness bids fair to wreck our age’. He writes of the imperial presidencies of the early years of the country, which repressed dissent during wartime, and how the US moved from wars based on pique to engaging international diplomacy and internationalism. Schlesinger reminds us that all presidents since Wilson, with George W. Bush being the glaring exception, believed in statesmanship, diplomacy, alliances to guard against capricious choices and, when necessary, taking on common enemies. Much of Schlesinger's book, however, also chronicles the record of the current Administration which, by being ‘judge, jury, and executioner resurrects the imperial presidency’. An imperial presidency in the age of frigates and single-shot rifles cannot be compared with one that possesses weapons of mass destruction and a wooly-headed sense of divine guidance. We used to think of Henry Kissinger as the prototype for Dr Strangelove, but I wish Kubrick were still alive to do the remake with Dick Cheney and Donald Rumsfeld in mind. Needless to say, the recent election, instead of relegating George W. Bush and his hangers-on to the historical trashbin, has pushed them to the front of the international agenda. A secretive, defensive, unreflective president will now shape the world for our grandchildren. Each of these books elaborates on the ineffectiveness of Bush dealing with the real enemy while he digs deeper into a country where he is creating more enemies by the day. One has to ask why, instead of quietly writing their memoirs, two distinguished 87-year-old statesmen are raising the alarm and shaking us by the throat — like the aging Thomas Jefferson who, in his famous letter of 1820, said of the first compromise to try to divide the country between slave and free states: ‘this momentous question, like a firebell in the night, awakened and filled me with terror’. Byrd and Schlesinger hear the firebell and are ringing it to wake us up. Another quote that might better capture Bush and his legacy would be from the Bible he uses as justification for his policies: ‘He that troubleth his own house shall inherit the wind’ (Proverbs 11, 29).

962 citations

01 Jan 2008
TL;DR: By J. Biggs and C. Tang, Maidenhead, England; Open University Press, 2007.
Abstract: by J. Biggs and C. Tang, Maidenhead, England, Open University Press, 2007, 360 pp., £29.99, ISBN-13: 978-0-335-22126-4

938 citations

Journal ArticleDOI
19 Apr 2016-PLOS ONE
TL;DR: This paper aims to be a new well-funded basis for unsupervised anomaly detection research by publishing the source code and the datasets, and reveals the strengths and weaknesses of the different approaches for the first time.
Abstract: Anomaly detection is the process of identifying unexpected items or events in datasets, which differ from the norm. In contrast to standard classification tasks, anomaly detection is often applied on unlabeled data, taking only the internal structure of the dataset into account. This challenge is known as unsupervised anomaly detection and is addressed in many practical applications, for example in network intrusion detection, fraud detection as well as in the life science and medical domain. Dozens of algorithms have been proposed in this area, but unfortunately the research community still lacks a comparative universal evaluation as well as common publicly available datasets. These shortcomings are addressed in this study, where 19 different unsupervised anomaly detection algorithms are evaluated on 10 different datasets from multiple application domains. By publishing the source code and the datasets, this paper aims to be a new well-funded basis for unsupervised anomaly detection research. Additionally, this evaluation reveals the strengths and weaknesses of the different approaches for the first time. Besides the anomaly detection performance, computational effort, the impact of parameter settings as well as the global/local anomaly detection behavior is outlined. As a conclusion, we give an advise on algorithm selection for typical real-world tasks.

737 citations

Journal ArticleDOI
TL;DR: An introductory overview of Vehicular Delay-Tolerant Networks is provided and some special issues like routing are addressed in the paper and an introductory description of applications and the most important projects is given.
Abstract: This paper provides an introductory overview of Vehicular Delay-Tolerant Networks. First, an introduction to Delay-Tolerant Networks and Vehicular Delay-Tolerant Networks is given. Delay-Tolerant schemes and protocols can help in situations where network connectivity is sparse or with large variations in density, or even when there is no end-to-end connectivity by providing a communications solution for non real-time applications. Some special issues like routing are addressed in the paper and an introductory description of applications and the most important projects is given. Finally, some research challenges are discussed and conclusions are detailed.

237 citations

Journal ArticleDOI
TL;DR: A VDTN routing protocol, called GeoSpray, which takes routing decisions based on geographical location data, and combines a hybrid approach between multiple-copy and single-copy schemes, and improves significantly the delivery probability and reduces the delivery delay.

227 citations