scispace - formally typeset
Search or ask a question
Author

Richard A. Raines

Bio: Richard A. Raines is an academic researcher from Air Force Institute of Technology. The author has contributed to research in topics: Communications satellite & Network packet. The author has an hindex of 23, co-authored 91 publications receiving 1883 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: An overview of key IRIDIUM design parameters and features are presented and the issues associated with routing in a dynamic network topology, focusing on network management and routing algorithm selection are examined, as well as performance results obtained via simulation.
Abstract: Today, both the military and commercial sectors are placing an increased emphasis on global communications. This has prompted the development of several low earth orbit satellite systems that promise worldwide connectivity and real-time voice communications. This article provides a tutorial overview of the IRIDIUM low earth orbit satellite system and performance results obtained via simulation. First, it presents an overview of key IRIDIUM design parameters and features. Then, it examines the issues associated with routing in a dynamic network topology, focusing on network management and routing algorithm selection. Finally, it presents the results of the simulation and demonstrates that the IRIDIUM system is a robust system capable of meeting published specifications.

207 citations

Patent
03 Apr 2012
TL;DR: In this article, a method, apparatus and program product are provided to recognize malware in a computing environment having at least one computer, and an automatic determination is made by the computer to determine if the sample is malware using static analysis methods.
Abstract: A method, apparatus and program product are provided to recognize malware in a computing environment having at least one computer. A sample is received. An automatic determination is made by the at least one computer to determine if the sample is malware using static analysis methods. If the static analysis methods determine the sample is malware, dynamic analysis methods are used by the at least one computer to automatically determine if the sample is malware. If the dynamic analysis methods determine the sample is malware, the sample is presented to a malware analyst to adjudicate the automatic determinations of the static and dynamic analyses. If the adjudication determines the sample is malware, a response action is initiated to recover from or mitigate a threat of the sample.

202 citations

Proceedings ArticleDOI
13 Jul 1998
TL;DR: This paper provides a tutorial overview of the IRIDIUM(R) low earth orbit (LEO) satellite system and analyzes the network performance in terms of end-to-end delay and hop count.
Abstract: This paper provides a tutorial overview of the IRIDIUM(R) low earth orbit (LEO) satellite system. Section I contains an introduction to the IRIDIUM(R) network as well as the system specifications. Section II discusses the satellite constellation design, orbital parameters, and horizontal pointing angles between satellites. Section III introduces the idea of time dependent connectivity in a mobile network, and analyzes the cycle of network connectivity for IRIDIUM(R). Section IV discusses the IRIDIUM(R) Time Division Multiple Access (TDMA) and Frequency Division Multiple Access (FDMA) schemes and uses these to calculate the overall system capacity. Section V examines the call processing procedure to include user location and call set up. Finally, Section VI analyzes the network performance in terms of end-to-end delay and hop count.

151 citations

Proceedings ArticleDOI
23 Oct 2006
TL;DR: This work has extended the concept of attack trees to a new tree structure called a protection tree as a tool for decision makers to allocate limited resources towards the appropriate defenses against a specified attack.
Abstract: Attacks against computer networks are a serious threat and occur quite often. Currently there are methods using attack trees that can be used to model how these attacks may occur. We have extended this concept to a new tree structure called a protection tree as a tool for decision makers to allocate limited resources towards the appropriate defenses against a specified attack. Protection trees ensure these limited resources are used in a manner to achieve the highest probability of success in stopping an attack. Protection trees are produced systematically by first developing an attack tree, computing metrics for each node of an attack, and then developing a corresponding protection tree with similar metrics. Eventually, libraries of attacks and available protections can be used to automate the process of developing the trees. An example attack and protection tree is used to notionally show how an organization such as the Department of Homeland Security can allocate resources to protect their computer networks from being compromised. Decision makers in the organization can use the resultant protection tree to determine where to allocate limited resources for the best protection of their network.

94 citations

Proceedings ArticleDOI
21 Jun 2006
TL;DR: This paper focuses on the use of generalized stochastic PNs (GSPNs) to model and analyze attack trees with the ultimate goal of automating the analysis using simulation tools.
Abstract: In recent years, attack trees have been developed to describe processes by which malicious users attempt to exploit or break computer software and/or networks. Attack trees are a way of decomposing, visualizing, and determining the cost or likeliness of attacks. Similarly, Petri nets (PNs) are graphical representations of a system or process used for modeling, formal analysis, and design verification. PNs are easy to build and simulate using a myriad of available tools. There are a number of subclasses of PNs, including colored, timed, stochastic, etc. This paper focuses on the use of generalized stochastic PNs (GSPNs) to model and analyze attack trees with the ultimate goal of automating the analysis using simulation tools. The results of this simulation and analysis can be used to further refine the attack tree or to develop countermeasures

86 citations


Cited by
More filters
Book
01 Jan 1996

1,170 citations

Journal ArticleDOI
TL;DR: Simulation results show that MMSPEED provides QoS differentiation in both reliability and timeliness domains and, as a result, significantly improves the effective capacity of a sensor network in terms of number of flows that meet both reliabilityand timelier requirements up to 50 percent.
Abstract: In this paper, we present a novel packet delivery mechanism called Multi-Path and Multi-SPEED Routing Protocol (MMSPEED) for probabilistic QoS guarantee in wireless sensor networks. The QoS provisioning is performed in two quality domains, namely, timeliness and reliability. Multiple QoS levels are provided in the timeliness domain by guaranteeing multiple packet delivery speed options. In the reliability domain, various reliability requirements are supported by probabilistic multipath forwarding. These mechanisms for QoS provisioning are realized in a localized way without global network information by employing localized geographic packet forwarding augmented with dynamic compensation, which compensates for local decision inaccuracies as a packet travels towards its destination. This way, MMSPEED can guarantee end-to-end requirements in a localized way, which is desirable for scalability and adaptability to large scale dynamic sensor networks. Simulation results show that MMSPEED provides QoS differentiation in both reliability and timeliness domains and, as a result, significantly improves the effective capacity of a sensor network in terms of number of flows that meet both reliability and timeliness requirements up to 50 percent (12 flows versus 18 flows).

863 citations

Journal ArticleDOI
TL;DR: This paper explores current perspectives in power consumption for next generation networks, and provides a detailed survey on emerging technologies, projects, and work-in-progress standards, which can be adopted in networks and related infrastructures in order to reduce their carbon footprint.
Abstract: The concept of energy-efficient networking has begun to spread in the past few years, gaining increasing popularity. Besides the widespread sensitivity to ecological issues, such interest also stems from economic needs, since both energy costs and electrical requirements of telcos' and Internet Service Providers' infrastructures around the world show a continuously growing trend. In this respect, a common opinion among networking researchers is that the sole introduction of low consumption silicon technologies may not be enough to effectively curb energy requirements. Thus, for disruptively boosting the network energy efficiency, these hardware enhancements must be integrated with ad-hoc mechanisms that explicitly manage energy saving, by exploiting network-specific features. This paper aims at providing a twofold contribution to green networking. At first, we explore current perspectives in power consumption for next generation networks. Secondly, we provide a detailed survey on emerging technologies, projects, and work-in-progress standards, which can be adopted in networks and related infrastructures in order to reduce their carbon footprint. The considered approaches range from energy saving techniques for networked hosts, to technologies and mechanisms for designing next-generation and energy-aware networks and networking equipment.

716 citations

Journal ArticleDOI
TL;DR: This paper is the first to present the state-of-the-art of the SAGIN since existing survey papers focused on either only one single network segment in space or air, or the integration of space-ground, neglecting the Integration of all the three network segments.
Abstract: Space-air-ground integrated network (SAGIN), as an integration of satellite systems, aerial networks, and terrestrial communications, has been becoming an emerging architecture and attracted intensive research interest during the past years. Besides bringing significant benefits for various practical services and applications, SAGIN is also facing many unprecedented challenges due to its specific characteristics, such as heterogeneity, self-organization, and time-variability. Compared to traditional ground or satellite networks, SAGIN is affected by the limited and unbalanced network resources in all three network segments, so that it is difficult to obtain the best performances for traffic delivery. Therefore, the system integration, protocol optimization, resource management, and allocation in SAGIN is of great significance. To the best of our knowledge, we are the first to present the state-of-the-art of the SAGIN since existing survey papers focused on either only one single network segment in space or air, or the integration of space-ground, neglecting the integration of all the three network segments. In light of this, we present in this paper a comprehensive review of recent research works concerning SAGIN from network design and resource allocation to performance analysis and optimization. After discussing several existing network architectures, we also point out some technology challenges and future directions.

661 citations

Patent
14 Sep 2012
TL;DR: In this paper, the authors present a system that allows mobile subscribers, and others, to submit mobile applications to be analyzed for anomalous and malicious behavior using data acquired during the execution of the application within a highly instrumented and controlled environment for which the analysis relies on per-execution as well as comparative aggregate data across many such executions from one or more subscribers.
Abstract: The present system includes a computer-networked system that allows mobile subscribers, and others, to submit mobile applications to be analyzed for anomalous and malicious behavior using data acquired during the execution of the application within a highly instrumented and controlled environment for which the analysis relies on per-execution as well as comparative aggregate data across many such executions from one or more subscribers.

625 citations