
Joseph G. Tront- Virginia Tech
Joseph G. Tront
- Virginia Tech
About
171
Publications
63,787
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,577
Citations
Introduction
Current institution
Publications
Publications (171)
This research explores the uses of a Micro Moving Target IPv6 Defense (μMT6D). In this initial experiment we assess the power consumption overhead and detail the overall security benefits gained from use of this technique. Moving Target Defenses were seen as game changers in the security field and now we must change the game once more and look towa...
In this paper we document our approach to overcoming service discovery and configuration of Apache Hadoop and Spark frameworks with dynamic resource allocations in a batch oriented Advanced Research Computing (ARC) High Performance Computing (HPC) environment. ARC efforts have produced a wide variety of HPC architectures. A common HPC architectural...
As the use of low-power and low-resource embedded devices continues to increase dramatically with the introduction of new Internet of Things (IoT) devices, security techniques are necessary which are compatible with these devices. This research advances the knowledge in the area of cyber security for the IoT through the exploration of a moving targ...
Network analysts have long used two-dimensional security visualizations to make sense of overwhelming amounts of network data. As networks grow larger and more complex, two-dimensional displays can become convoluted, compromising user cyber-threat perspective. Using augmented reality to display data with cyber-physical context creates a naturally i...
In the wake of crisis situations that can bring tragedy through the loss of human life, or the devastating destruction of homes or buildings, people begin to recognize the need for better processes and more advanced systems. Crisis and emergency notification systems that utilize the correct communication channels can help to quickly disseminate ale...
Moving Target IPv6 Defense (MT6D) imparts radio-frequency hopping behavior to IPv6 networks by having participating nodes periodically hop onto new addresses while giving up old addresses. Our previous research efforts implemented a solution to identify and acquire these old addresses that are being discarded by MT6D hosts on a local network beside...
This paper introduces a new method of securely exchanging information through a moving blind rendezvous by leveraging the size and distributed nature of BitTorrent Mainline Distributed Hash Table (DHT) in order to bootstrap a connection between nodes in a network layer moving target defense (MTD) system. Specifically we demonstrate an implementatio...
The VText framework is designed to provide many of the desired features of an e-textbook in such a way that it provides pedagogical value rather than just convenience for students. Many so-called e-textbook solutions available today provide few features beyond those possible with hardcopy textbooks. The VText framework is built as an add-in to Micr...
The immense address space available with the new 128-bit addressing scheme enables mechanisms like Moving Target Defense for IPv6 networks. Moving Target IPv6 Defense (MT6D) promises security by letting nodes hop to new addresses that are cryptographically computed between involved nodes without disrupting ongoing conversations. After implementing...
Moving target defense is an area of network security research in which machines are moved logically around a network in order to avoid detection. This is done by leveraging the immense size of the IPv6 address space and the statistical improbability of two machines selecting the same IPv6 address. This defensive technique forces a malicious actor t...
To secure the Internet of Things (IoT) running on IPv6 over Low-Powered Wireless Personal Area Networks (6LoWPAN) by implementing a Moving Target IPv6 Defense (MT6D), there must first be a method developed to dynamically change IPv6 addresses over this resource constrained wireless network. We will discuss how we implemented this dynamic address ch...
Tablet PCs use their inherent ability to accept electronic ink (e-ink) and touch gesture input to enable users to interact with the device in a more natural way. This is especially important in learning environments where the user needs to focus on subject material rather than on the device used to record or store the subject information. Using Tab...
The growing momentum of the Internet of Things (IoT) has shown an increase in attack vectors within the security research community. We propose adapting a recent new approach of frequently changing IPv6 address assignment to add an additional layer of security to the Internet of Things. We examine implementing Moving Target IPv6 Defense (MT6D) in I...
Optimizing responses to various crises is a critical task for the government, institutions, first responders, and everyone involved in public safety. This paper describes the design methodology of ongoing research for planning, implementing, and analyzing the operation of a software application for an optimized crisis alert system. Design decisions...
This paper reports the results from a multi-phase study to assess the impact of rewards on the teaching practice of engineering educators and to describe the spread of pedagogical innovations across engineering education. The study is situated within the context of the Premier Award for Excellence in Engineering Education Courseware, which from 199...
Complex defenses, such as moving target defenses, exist to help protect against threats. While these new forms of defense offer increased security, they are resource intensive and cannot be run on many new classes of network connected mobile systems. To provide security for these systems, a highly efficient defense must be used. Moving Target Defen...
Multiple industries, from defense to medical, are increasing their use of unmanned systems. Today, many of
these systems are rapidly designed, tested, and deployed without adequate security testing. To aid the quick turnaround,
commercially available subsystems and embedded components are often used. These components may introduce
security vulnerab...
Unmanned Ground vehicles (UGVs) are becoming prolific in the heterogeneous superset of robotic platforms. The
sensors which provide odometry, localization, perception, and vehicle diagnostics are fused to give the robotic platform
a sense of the environment it is traversing. The automotive industry CAN bus has dominated the industry due to the
faul...
As computing becomes mobile and systems enable connectivity through mobile applications, the characteristics of the network communication of these systems change due to the instability of mobile nodes on networks. Mobile devices logically move by changing addresses throughout the course of their communication in the system. These mobiles nodes acqu...
In this paper, a previously proposed biological sensor system is improved to be more compatible with integrated circuit (IC) technology. The re-designed sensor head detects electromagnetic changes caused by the presence of ferromagnetic tags attached to target pathological and bioterrorism agents (zoonotic microorganisms) both in liquid or gaseous...
As systems and networks begin to transition to the Internet Protocol version 6 (IPv6), the immense address space available in the new protocol allows for devices to maintain multiple addresses and to change addresses frequently. These new capabilities encourage network layer moving target defenses in IPv6. Yet, common transport layer protocols, suc...
Pedagogical approaches that incorporate learning technologies into lessons and coursework have had promising results in relation to students' motivation to learn. Tablet PCs have been identified as one form of instructional technology that can facilitate learning among engineering undergraduates since this medium allows for drawing on the computer...
In this paper, the design of a biological sensor is proposed in order to rapidly test for the presence of potential pathologic and bioterrorism agents (zoonotic microorganisms) both in specimens as well as in the environment. The sensor uses an electromagnetic detection mechanism to measure changes in the number of magnetically tagged microorganism...
The Internet Protocol version 6 (IPv6) is being adopted in networks around the world as the Internet Protocol version 4 (IPv4) address space is nearing maximum capacity. Security needs are changing because of various new aspects of IPv6, such as the way addresses are determined. There are security applications that are being developed to meet these...
Most networks today employ static network defenses. The problem with static defenses is that adversaries have unlimited time to circumvent them. This article proposes a moving-target defense based on the Internet Protocol version 6 (IPv6) that dynamically obscures network-layer and transport-layer addresses. This technique can be thought of as "fre...
Systems and network defenses currently implementing a Defense in Depth (DiD) strategy frequently slow attackers' progress but do not act as a secure barrier. These systems of network defense methods are primarily comprised of static defenses focused on preventing attacks from entering a network by enabling the features of blocking access, requiring...
In this paper we describe preliminary results from two ongoing research projects that investigate the dissemination practices surrounding digital STEM learning materials for undergraduates. This research consists of two related studies, : 1) survey research about the dissemination practices of NSF-funded PIs; and, 2) a case study on the disseminati...
E-textbooks encourage the user to perform all of the operations typically performed with a hardcopy text in addition to some functions not possible with paper books. This project works to implement an e-textbook with as much capability as possible using software tools that are already in place. Because Microsoft OneNote already implements some of t...
As protection against the current privacy weaknesses of StateLess Address AutoConfiguration (SLAAC) in the Internet Protocol version 6 (IPv6), network administrat-ors may choose to deploy the new Dynamic Host Configuration Protocol for IPv6 (DHCPv6). Similar to the Dynamic Host Configuration Protocol (DHCP) for the Internet Protocol version 4 (IPv4...
Every day, networks are flooded with data that far exceeds what humans can feasibly comb through in a timely manner. Security analysts have turned to visualization techniques to in an attempt to streamline the identification of network threats. The problem is that most security visualization techniques do not take into account the cognitive princip...
As advanced Internet Protocol (IP)-based communication systems are proposed for the Smart Grid, security solutions must be developed which address not only the security of the communications, but also the security of the communicating systems. To support the large number of hosts required for the Smart Grid on an IP network, the new Internet Protoc...
In this paper, we report on a study regarding the impact of the Premier Award for Excellence in Engineering Education Courseware. This paper describes the first two phases of the research and findings with implications for engineering education. Research questions focus on, identifying the impact of the award on the courseware authors and developer...
The Internet Protocol version 6 (IPv6) brings with it a seemingly endless supply of network addresses. It does not, however, solve many of the vulnerabilities that existed in Internet Protocol version 4 (IPv4). In fact, privacy-related crimes in IPv6 are made easier due to the way IPv6 addresses are formed. We developed a Moving Target IPv6 Defense...
As protection against the current privacy weaknesses of StateLess Address AutoConfiguration (SLAAC) in the Internet Protocol version 6 (IPv6), network administrators may choose to deploy the new Dynamic Host Configuration Protocol for IPv6 (DHCPv6). Similar to the Dynamic Host Configuration Protocol (DHCP) for the Internet Protocol version 4 (IPv4)...
The National Science Foundation (NSF) Course Curriculum and Laboratory Improvement (CCLI) Program (now the TUES program — Transforming Undergraduate Education in STEM) has produced a vast number of products and processes since its inception. The CCLI Program has fostered innovation nationwide and has worked to improve “quality of science, technolog...
Tablet PCs use their inherent ability to accept electronic ink (e-ink) input to enable users to interact with the device in a more natural way. This is especially important in learning environments where the user needs to focus on subject material rather than on the device used to record or store the subject information. Using Tablet PCs, instructo...
This paper describes the pedagogy, including the related international experience, being employed in the College of Engineering at a Research I university that is designed to develop competencies associated with a global engineer. In addition, the assessment methodology that has been developed to determine the extent to which students are developin...
Are you trying to integrate interactive simulations, applets, case studies, courseware or other web-accessible materials into your classes? Where do you go to find these digital learning materials? How do you evaluate the quality of the materials you do find? Are there digital learning materials available that are aligned with the ABET criteria? Ar...
As more network-capable devices are developed, it becomes easier for us to remain connected to our friends, colleagues, and even our homes. Unfortunately, it becomes easier for unintended third parties to remain connected to us as well. The impact of this has been limited by our proximity to the third party (i.e. the same local area network) -- unt...
The amount of data that floods today's networks is well beyond what security analysts can manage by textual means alone. In an effort to solve this problem, researchers have explored different methods of visualizing network security threats. There is little debate that humans can perceive more information visually than textually. The problem is tha...
Due to a large address space, Internet Protocol version 6 (IPv6) uses stateless address autoconfiguration to assign network addresses to hosts. This unmanaged technique creates a static value derived from the Media Access Control (MAC) address of a network interface as the host portion, or interface identifier (IID). Static IID assignment provides...
As protection against the current privacy weaknesses of StateLess Address Auto Configuration (SLAAC) in the Internet Protocol version 6 (IPv6), network administrators may choose to deploy the new Dynamic Host Configuration Protocol for IPv6 (DHCPv6). Similar to the Dynamic Host Configuration Protocol (DHCP) for Internet Protocol version 4 (IPv4), D...
Static network addressing allows for attackers to geographically track hosts and launch network attacks. While technologies such as DHCP claim dynamic addressing, the majority of network addresses currently deployed are static for at least a session. Dynamic addresses, changing multiple times within a session, disassociate a user with a static addr...
The Battery-Sensing Intrusion Protection System (B-SIPS) [1] initially took a non-conventional approach to intrusion detection by recognizing attacks based on anomalous Instantaneous Current (IC) drain. An extension of B-SIPS, the Multi-Vector Portable Intrusion Detection System (MVP-IDS) validates the idea of recognizing attacks based on anomalous...
Current implementations of the Internet Protocol version 6 (IPv6) use a static value determined from the Media Access Control (MAC) address as the host portion, or interface identifier (IID), of the IPv6 address. Some implementations create the IID using the MAC unobscured, while others compute a onetime hash value involving the MAC. As a result of...
This paper provides insight into the ramifications of battery exhaustion Denial of Service (DoS) attacks on battery-powered mobile devices. Several IEEE 802.11 Wi-Fi, IEEE 802.15.1 Bluetooth, and blended attacks are studied to understand their effects on device battery lifetimes. In the worst case, DoS attacks against mobile devices were found to a...
This paper discusses mobile device security and extends the original battery-sensing intrusion protection system (B-SIPS) (Buennemeyer, 2008) design by introducing the multi-vector portable intrusion detection system (MVP-IDS). MVP-IDS validates reported anomalous battery depletion from B-SIPS clients with real-time Wi-Fi and Bluetooth traffic usin...
A Tablet PC combines all the features of a regular laptop computer with a digitizing screen that interacts with a complementary electronic pen stylus. The ability to annotate on a lecture presentation using the pen stylus of the Tablet PC has attracted the attention of academics to use them as a potential tool for effective classroom instruction. T...
A Tablet PC combines all the features of a regular laptop computer with a digitizing screen that interacts with a complementary electronic pen stylus. The ability to annotate on a lecture presentation using the pen stylus of the Tablet PC has attracted the attention of academics to use them as a potential tool for effective classroom instruction. T...
This paper extends Battery-Sensing Intrusion Protection System (B-SIPS) research by utilizing network simulations for deployment validation and optimization. The primary simulation goal is to ensure that B-SIPS does not negatively affect external applications in the network, as any drastic throughput degradation would severely lower the probability...
A Tablet PC combines all the features of a regular laptop computer with a digitizing screen that interacts with a complementary electronic pen stylus. The ability to annotate on a lecture presentation using the pen stylus of the Tablet PC has attracted the attention of academics to use them as a potential tool for effective classroom instruction. T...
With the advent of the information age, engineering educators have struggled to change pedagogical practice to prepare students for the pace and complexity of the world ahead. Constructivist instructional methods are particularly promising because they explicitly promote active evaluation of information and higher-order thinking, and encourage facu...
This paper introduces capabilities developed for a Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts when abnormal current changes are detected. The intrusion detection system's (IDS's) IEEE 802.15.1 (Bluetooth) and 802.11 (Wi-Fi) capabilities are enhanced with iterative safe process checking, wireless connecti...
Tablet PCs are one of the newest innovations in computing and communications tools, offering an opportunity to positively impact the way in which students and faculty use technology to support teaching and learning. In this three hour workshop faculty will receive a hands-on introduction to the use of several tablet-based software tools including O...
Tablet PCs are one of the newest innovations in the computing and communications world and have the potential for significantly improving the way in which faculty members teach and the many different processes and mechanisms involved in student learning. After much discussion and experimentation, the Virginia Tech College of Engineering decided to...
Educational technology has been shown to be an effective mechanism to foster improvements in pedagogical practices in the learning environment. In the fall of 2006, the Virginia Tech College of Engineering became the first and largest public college of engineering to require all 1400 incoming students to own a Tablet PC. The purpose of this require...
This paper introduces a supporting model for a unique battery-sensing intrusion protection system (B-SIPS) for mobile computers, which alerts when power changes are detected on small wireless devices. An analytical model is employed to examine the smart battery characteristics to support the theoretical intrusion detection limits and capabilities o...
This paper describes a unique battery-sensing intrusion protection system (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using an innovative Dynamic Threshold Calculation algorithm. B-SIPS enabled hosts are employed as sensors in a wireless network and form the basis of the intrusion detection syste...
Tablet PCs are one of the newest innovations in the computing and communications world. These devices consist of a standard notebook PC configured with a screen (tablet/slate) which acts as both a display device as well as an input device. A stylus or pen can be used to input standard mouse-type commands as well as gesture commands and electronic i...
This paper introduces a supporting model for a unique battery-sensing intrusion protection system (B-SIPS) for mobile computers, which alerts when power changes are detected on small wireless devices. An analytical model is employed to examine smart battery characteristics to support the theoretical intrusion detection limits and capabilities of B-...
Summary form only given. This article focuses on the types of security problems that can occur in mobile wirelessly-connected systems, the solutions for known problems, and strategies for circumventing these problems in the future
This paper proposes a pioneering Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using an innovative Dynamic Threshold Calculation algorithm. B-SIPS enabled hosts are employed as sensors in a wireless network and form the basis of the intrusion detection sy...
Tablet PCs combine a standard notebook computer with a digitizing screen and a pen-like stylus device to produce a computer that allows ease of input of natural writing and drawing. The tool WriteOn was developed to allow the user to effectively draw on top of any application shown on the tablet PC screen. Conceptually set up as a virtual transpare...
This paper proposes an innovative battery-sensing intrusion protection system (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices. These hosts are employed as sensors in a wireless network and form the basis of the "Canary-Net" intrusion detection system (IDS). This detection capability is scalable and co...
In this talk we describe a new software package called WriteOn. By using this software on a tablet PC, instructors can significantly improve their classroom presentations and demonstrations.
In this paper, we discuss an advance in technology-aided instruction. Not limited as in the past to PowerPoint-based or white board-centered electronic ink applications, the new tool, WriteOn, allows the instructor to use electronic ink to annotate on top of any application visible on the tablet PC display screen. WriteOn has been successfully used...
In this talk we describe a new software package called WriteOn. By using this software on a tablet PC, instructors can significantly improve their classroom presentations and demonstrations.
In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling pervasive computing systems gain a foothold presence in becoming more flexible and, at the same time, more invisibly interconnected, system users may have to trade privacy and p...
This paper discusses best practices in the design, development and use of engineering education courseware by examining the courseware recognized through the Premier Award for Excellence in Engineering Education Courseware. Led by NEEDS - A Digital Library for Engineering Education and supported by industry, the courseware recognized through the Pr...
This paper describes the experiences of using Tablet PCs along with associated software, such as Classroom Presenter and OneNote, in a course entitled Introduction to Computer Engineering. Twenty tablet PCs were distributed in a classroom of 40 students. Students used the tablets on a daily basis throughout the semester to take notes, to respond to...
This paper reviews the literature on inter-organizational information systems. It has long beenargued that information technology can have profound effects on the structure and process of inter-firm relationships. This proposition has gained additional ...
The emergence of the Web as a delivery mechanism for education has led a number of organizations to develop and implement quality evaluation cri- teria for digital learning resources and Web-based courses. The Chinese E- Learning Technology Standardization Committee is developing a specification for evaluating Web-based courses. This paper introduc...
Daily commerce on the Internet consists of billions of dollars worth of transactions. Unfortunately, the Internet has become the lurking grounds for electronic n'er-do-wells who are constantly jeopardizing the processes of business. Recent network events throughout the world have caused people to become more and more hesitant to transact business o...
Internet security is of utmost importance in today's e-commerce environment. Many different avenues are being taken in an attempt to secure the systems of both the end user as well as the server of information. The operating system, as well as application software, provide holes through which security is breached. One vulnerable part of the system...
Broadband wireless technologies have the potential to provide integrated data and multimedia services in several niche areas. The rapid emergence of many new protocols in this area has created a growing need to develop high performance communication systems that can satisfy high-end data processing requirements inherent in these technologies within...
Internet security is of utmost importance in today's e-commerce environment. Many different avenues are being taken in an attempt to secure the systems of both the end user as well as the server of information. The operating system, as well as application software, provide holes through which security is breached. One vulnerable part of the system...