Nathaniel Soule

  • Citations Per Year
Learn More
Transport Layer Security (TLS) and its precursor Secure Sockets Layer (SSL) are the most widely deployed protocol to establish secure communication over insecure Internet Protocol (IP) networks. Providing a secure session layer on top of TCP, TLS is frequently the first defense layer encountered by adversaries who try to cause loss of confidentiality by(More)
In a distributed information system, Quality of Service (QoS) and Information Assurance (IA) compete for the same set of resources. This tension increases in the presence of cyber attacks. Previous work formulated the problem of trading off QoS against IA as a DCOP whose solution sets the local configuration at individual decision-making nodes to optimize(More)
Mobile devices performing mission-critical functions at the tactical edge, such as those employed by first responders, military personnel, and law enforcement, operate in environments that are vastly different from enterprise computing environments. In spite of the differences in resource availability, threat models, vulnerabilities, information formats,(More)
In a distributed information system, Quality of Service (QoS) and Information Assurance (IA) compete for the same set of resources. This tension increases in the presence of cyber attacks. Previous work formulated the problem of trading off QoS against IA as a DCOP whose solution sets the local configuration at individual decision-making nodes to optimize(More)
Transport Layer Security (TLS) and its precursor Secure Sockets Layer (SSL) are the most widely deployed protocol to establish secure communication over insecure Internet Protocol (IP) networks. Providing a secure session layer on top of TCP, TLS is frequently the first defense layer encountered by adversaries who try to cause loss of confidentiality by(More)
Distributed Denial of Service (DDoS) attacks routinely disrupt access to critical services. Mitigation of these attacks often relies on planned over-provisioning or elastic provisioning of resources, and third-party monitoring, analysis, and scrubbing of network traffic. While volumetric attacks which saturate a victim's network are most common,(More)
  • 1