George Louthan

Learn More
Attack graphs provide a comprehensive overview of attack vectors. Unfortunately, their complexity dramatically increases as the number of hosts in a network grows. For realistic networks, the human eye cannot discern the state of a network without tracing individual attack paths. In order to combat this complexity, we discuss and implement mitigation(More)
Wikis have proven to be an invaluable tool for collaboration. The most prominent is, of course, Wikipedia. Its open nature is not suitable for all environments; in corporate, government, and research environments it is often necessary to control access to some or all of the information due to confidentially, privacy, or security concerns. This paper(More)
In spite of the controversy surrounding the practice of using offensive computer security exercises in information assurance curricula, it holds significant educational value. An exercise and architecture for an asymmetric (offense-only) security project, nicknamed “Blunderdome”, has been deployed twice at the University of Tulsa: once to graduate students(More)
This extended abstract presents a set of continuous-domain extensions to the attack graph, a formalism used to model the interactions of multiple exploits and assets in a network. These extensions result in a new modeling framework called the hybrid attack dependency graph, which provides the novel capability of modeling continuous state variables and their(More)
The OneOklahoma Friction Free Network (OFFN) is a dedicated multi-institutional research-only "Science DMZ" network that connects the state's academic Cyberinfrastructure resources -- including all four high performance computing centers -- that is available for use by all Oklahoma academics plus their collaborators. A project of the OneOklahoma(More)
Critical infrastructures and safety critical systems increasingly rely on the carefully orchestrated interactions between computers, networks and kinetic elements. The dominant formalisms for modeling such hybrid systems (those with discrete and continuous components) are geared towards simple reactive systems working in isolation. By contrast, modern(More)
Network monitoring and management rely extensively upon network protocol identification as one of the most basic acts of analysis of network traffic. However, the conventional method of identifying network protocols based upon standard or well-known port numbers is no longer sufficient for modern networks, given the propensities for users and programs to(More)
Prior to the early 2000s, Oklahoma institutions had a very limited history of submitting research Cyberinfrastructure (CI) grant proposals. But over the past decade, this trend has dramatically reversed: since 2003, Oklahoma institutions have submitted 15 research CI proposals, including 8 National Science Foundation (NSF) Major Research Instrumentation(More)
  • 1