- Full text PDF available (1)
engineering from the university of Pittsburgh, and a B.S. from Carnegie Mellon university. He received his professional engineer's license in 1965. In a 2005 journal article in Communications of the AIS, he was recognized as the fourth-to the sixth-most-productive researcher for the period 1991–2003. Dr. Nunamaker received the lEO award from the association… (More)
The Internet of Things (IoT) continues to grow as uniquely identifiable objects are added to the internet. The addition of these devices, and their remote connectivity, has brought a new level of efficiency into our lives. However, the security of these devices has come into question. While many may be secure, the sheer number creates an environment where… (More)
This poster analyzes the Alphabay underground marketplace - an anonymous trading grounds for illicit goods and services. Listing data was collected and interpreted using Latent-Dirichlet Allocation (LDA), to determine common topics in the listings. Results found offer insight to the types of goods being sold and who is selling them.
Supervisory Control and Data Acquisition (SCADA) honeypots are key tools not only for determining threats which pertain to SCADA devices in the wild, but also for early detection of potential malicious tampering within a SCADA device network. An analysis of one such SCADA honeypot, Conpot, is conducted to determine its viability as an effective SCADA… (More)
Many of today's devices are internet-enabled with IPv4 internet addresses, exposing them to internet threats. To determine the true scale of vulnerabilities being introduced, particularly in the IPv4 internet address space, a new methodology of scanning the entire IPv4 internet space is required. To improve scanning speeds we created a framework combining… (More)
Critical infrastructure such as power plants, oil refineries, and sewage are at the core of modern society. Supervisory Control and Data Acquisition (SCADA) systems were designed to allow human operators supervise, maintain, and control critical infrastructure. Recent years has seen an increase in connectivity of SCADA systems to the Internet. While this… (More)
The anonymizing network Tor is examined as one method of anonymizing port scanning tools and avoiding identification and retaliation. Performing anonymized port scans through Tor is possible using Nmap, but parallelization of the scanning processes is required to accelerate the scan rate.
The purpose of this paper is to discuss how using Gephi to visualize the open ports at IP addresses in Shodan may provide a means of identifying SCADA devices. Visualizations were created using both IP addresses and open ports as nodes. Modularity, centralities, and layout were used to enhance the visualizations. From these visualizations we hope to gather… (More)