Joseph G. Tront

Joseph G. Tront
  • Virginia Tech

About

171
Publications
63,787
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,577
Citations
Current institution
Virginia Tech

Publications

Publications (171)
Article
This research explores the uses of a Micro Moving Target IPv6 Defense (μMT6D). In this initial experiment we assess the power consumption overhead and detail the overall security benefits gained from use of this technique. Moving Target Defenses were seen as game changers in the security field and now we must change the game once more and look towa...
Conference Paper
In this paper we document our approach to overcoming service discovery and configuration of Apache Hadoop and Spark frameworks with dynamic resource allocations in a batch oriented Advanced Research Computing (ARC) High Performance Computing (HPC) environment. ARC efforts have produced a wide variety of HPC architectures. A common HPC architectural...
Conference Paper
As the use of low-power and low-resource embedded devices continues to increase dramatically with the introduction of new Internet of Things (IoT) devices, security techniques are necessary which are compatible with these devices. This research advances the knowledge in the area of cyber security for the IoT through the exploration of a moving targ...
Conference Paper
Network analysts have long used two-dimensional security visualizations to make sense of overwhelming amounts of network data. As networks grow larger and more complex, two-dimensional displays can become convoluted, compromising user cyber-threat perspective. Using augmented reality to display data with cyber-physical context creates a naturally i...
Article
In the wake of crisis situations that can bring tragedy through the loss of human life, or the devastating destruction of homes or buildings, people begin to recognize the need for better processes and more advanced systems. Crisis and emergency notification systems that utilize the correct communication channels can help to quickly disseminate ale...
Article
Full-text available
Moving Target IPv6 Defense (MT6D) imparts radio-frequency hopping behavior to IPv6 networks by having participating nodes periodically hop onto new addresses while giving up old addresses. Our previous research efforts implemented a solution to identify and acquire these old addresses that are being discarded by MT6D hosts on a local network beside...
Conference Paper
This paper introduces a new method of securely exchanging information through a moving blind rendezvous by leveraging the size and distributed nature of BitTorrent Mainline Distributed Hash Table (DHT) in order to bootstrap a connection between nodes in a network layer moving target defense (MTD) system. Specifically we demonstrate an implementatio...
Chapter
The VText framework is designed to provide many of the desired features of an e-textbook in such a way that it provides pedagogical value rather than just convenience for students. Many so-called e-textbook solutions available today provide few features beyond those possible with hardcopy textbooks. The VText framework is built as an add-in to Micr...
Conference Paper
The immense address space available with the new 128-bit addressing scheme enables mechanisms like Moving Target Defense for IPv6 networks. Moving Target IPv6 Defense (MT6D) promises security by letting nodes hop to new addresses that are cryptographically computed between involved nodes without disrupting ongoing conversations. After implementing...
Article
Moving target defense is an area of network security research in which machines are moved logically around a network in order to avoid detection. This is done by leveraging the immense size of the IPv6 address space and the statistical improbability of two machines selecting the same IPv6 address. This defensive technique forces a malicious actor t...
Article
To secure the Internet of Things (IoT) running on IPv6 over Low-Powered Wireless Personal Area Networks (6LoWPAN) by implementing a Moving Target IPv6 Defense (MT6D), there must first be a method developed to dynamically change IPv6 addresses over this resource constrained wireless network. We will discuss how we implemented this dynamic address ch...
Conference Paper
Tablet PCs use their inherent ability to accept electronic ink (e-ink) and touch gesture input to enable users to interact with the device in a more natural way. This is especially important in learning environments where the user needs to focus on subject material rather than on the device used to record or store the subject information. Using Tab...
Article
The growing momentum of the Internet of Things (IoT) has shown an increase in attack vectors within the security research community. We propose adapting a recent new approach of frequently changing IPv6 address assignment to add an additional layer of security to the Internet of Things. We examine implementing Moving Target IPv6 Defense (MT6D) in I...
Conference Paper
Full-text available
Optimizing responses to various crises is a critical task for the government, institutions, first responders, and everyone involved in public safety. This paper describes the design methodology of ongoing research for planning, implementing, and analyzing the operation of a software application for an optimized crisis alert system. Design decisions...
Article
This paper reports the results from a multi-phase study to assess the impact of rewards on the teaching practice of engineering educators and to describe the spread of pedagogical innovations across engineering education. The study is situated within the context of the Premier Award for Excellence in Engineering Education Courseware, which from 199...
Conference Paper
Complex defenses, such as moving target defenses, exist to help protect against threats. While these new forms of defense offer increased security, they are resource intensive and cannot be run on many new classes of network connected mobile systems. To provide security for these systems, a highly efficient defense must be used. Moving Target Defen...
Conference Paper
Multiple industries, from defense to medical, are increasing their use of unmanned systems. Today, many of these systems are rapidly designed, tested, and deployed without adequate security testing. To aid the quick turnaround, commercially available subsystems and embedded components are often used. These components may introduce security vulnerab...
Conference Paper
Unmanned Ground vehicles (UGVs) are becoming prolific in the heterogeneous superset of robotic platforms. The sensors which provide odometry, localization, perception, and vehicle diagnostics are fused to give the robotic platform a sense of the environment it is traversing. The automotive industry CAN bus has dominated the industry due to the faul...
Conference Paper
As computing becomes mobile and systems enable connectivity through mobile applications, the characteristics of the network communication of these systems change due to the instability of mobile nodes on networks. Mobile devices logically move by changing addresses throughout the course of their communication in the system. These mobiles nodes acqu...
Conference Paper
In this paper, a previously proposed biological sensor system is improved to be more compatible with integrated circuit (IC) technology. The re-designed sensor head detects electromagnetic changes caused by the presence of ferromagnetic tags attached to target pathological and bioterrorism agents (zoonotic microorganisms) both in liquid or gaseous...
Conference Paper
As systems and networks begin to transition to the Internet Protocol version 6 (IPv6), the immense address space available in the new protocol allows for devices to maintain multiple addresses and to change addresses frequently. These new capabilities encourage network layer moving target defenses in IPv6. Yet, common transport layer protocols, suc...
Article
Pedagogical approaches that incorporate learning technologies into lessons and coursework have had promising results in relation to students' motivation to learn. Tablet PCs have been identified as one form of instructional technology that can facilitate learning among engineering undergraduates since this medium allows for drawing on the computer...
Conference Paper
In this paper, the design of a biological sensor is proposed in order to rapidly test for the presence of potential pathologic and bioterrorism agents (zoonotic microorganisms) both in specimens as well as in the environment. The sensor uses an electromagnetic detection mechanism to measure changes in the number of magnetically tagged microorganism...
Conference Paper
The Internet Protocol version 6 (IPv6) is being adopted in networks around the world as the Internet Protocol version 4 (IPv4) address space is nearing maximum capacity. Security needs are changing because of various new aspects of IPv6, such as the way addresses are determined. There are security applications that are being developed to meet these...
Article
Most networks today employ static network defenses. The problem with static defenses is that adversaries have unlimited time to circumvent them. This article proposes a moving-target defense based on the Internet Protocol version 6 (IPv6) that dynamically obscures network-layer and transport-layer addresses. This technique can be thought of as "fre...
Conference Paper
Systems and network defenses currently implementing a Defense in Depth (DiD) strategy frequently slow attackers' progress but do not act as a secure barrier. These systems of network defense methods are primarily comprised of static defenses focused on preventing attacks from entering a network by enabling the features of blocking access, requiring...
Article
In this paper we describe preliminary results from two ongoing research projects that investigate the dissemination practices surrounding digital STEM learning materials for undergraduates. This research consists of two related studies, : 1) survey research about the dissemination practices of NSF-funded PIs; and, 2) a case study on the disseminati...
Article
E-textbooks encourage the user to perform all of the operations typically performed with a hardcopy text in addition to some functions not possible with paper books. This project works to implement an e-textbook with as much capability as possible using software tools that are already in place. Because Microsoft OneNote already implements some of t...
Article
Full-text available
As protection against the current privacy weaknesses of StateLess Address AutoConfiguration (SLAAC) in the Internet Protocol version 6 (IPv6), network administrat-ors may choose to deploy the new Dynamic Host Configuration Protocol for IPv6 (DHCPv6). Similar to the Dynamic Host Configuration Protocol (DHCP) for the Internet Protocol version 4 (IPv4...
Conference Paper
Every day, networks are flooded with data that far exceeds what humans can feasibly comb through in a timely manner. Security analysts have turned to visualization techniques to in an attempt to streamline the identification of network threats. The problem is that most security visualization techniques do not take into account the cognitive princip...
Article
As advanced Internet Protocol (IP)-based communication systems are proposed for the Smart Grid, security solutions must be developed which address not only the security of the communications, but also the security of the communicating systems. To support the large number of hosts required for the Smart Grid on an IP network, the new Internet Protoc...
Article
In this paper, we report on a study regarding the impact of the Premier Award for Excellence in Engineering Education Courseware. This paper describes the first two phases of the research and findings with implications for engineering education. Research questions focus on, identifying the impact of the award on the courseware authors and developer...
Article
Full-text available
The Internet Protocol version 6 (IPv6) brings with it a seemingly endless supply of network addresses. It does not, however, solve many of the vulnerabilities that existed in Internet Protocol version 4 (IPv4). In fact, privacy-related crimes in IPv6 are made easier due to the way IPv6 addresses are formed. We developed a Moving Target IPv6 Defense...
Article
As protection against the current privacy weaknesses of StateLess Address AutoConfiguration (SLAAC) in the Internet Protocol version 6 (IPv6), network administrators may choose to deploy the new Dynamic Host Configuration Protocol for IPv6 (DHCPv6). Similar to the Dynamic Host Configuration Protocol (DHCP) for the Internet Protocol version 4 (IPv4)...
Article
The National Science Foundation (NSF) Course Curriculum and Laboratory Improvement (CCLI) Program (now the TUES program — Transforming Undergraduate Education in STEM) has produced a vast number of products and processes since its inception. The CCLI Program has fostered innovation nationwide and has worked to improve “quality of science, technolog...
Conference Paper
Full-text available
Tablet PCs use their inherent ability to accept electronic ink (e-ink) input to enable users to interact with the device in a more natural way. This is especially important in learning environments where the user needs to focus on subject material rather than on the device used to record or store the subject information. Using Tablet PCs, instructo...
Conference Paper
Full-text available
This paper describes the pedagogy, including the related international experience, being employed in the College of Engineering at a Research I university that is designed to develop competencies associated with a global engineer. In addition, the assessment methodology that has been developed to determine the extent to which students are developin...
Conference Paper
Full-text available
Are you trying to integrate interactive simulations, applets, case studies, courseware or other web-accessible materials into your classes? Where do you go to find these digital learning materials? How do you evaluate the quality of the materials you do find? Are there digital learning materials available that are aligned with the ABET criteria? Ar...
Conference Paper
As more network-capable devices are developed, it becomes easier for us to remain connected to our friends, colleagues, and even our homes. Unfortunately, it becomes easier for unintended third parties to remain connected to us as well. The impact of this has been limited by our proximity to the third party (i.e. the same local area network) -- unt...
Conference Paper
Full-text available
The amount of data that floods today's networks is well beyond what security analysts can manage by textual means alone. In an effort to solve this problem, researchers have explored different methods of visualizing network security threats. There is little debate that humans can perceive more information visually than textually. The problem is tha...
Conference Paper
Due to a large address space, Internet Protocol version 6 (IPv6) uses stateless address autoconfiguration to assign network addresses to hosts. This unmanaged technique creates a static value derived from the Media Access Control (MAC) address of a network interface as the host portion, or interface identifier (IID). Static IID assignment provides...
Article
As protection against the current privacy weaknesses of StateLess Address Auto Configuration (SLAAC) in the Internet Protocol version 6 (IPv6), network administrators may choose to deploy the new Dynamic Host Configuration Protocol for IPv6 (DHCPv6). Similar to the Dynamic Host Configuration Protocol (DHCP) for Internet Protocol version 4 (IPv4), D...
Article
Static network addressing allows for attackers to geographically track hosts and launch network attacks. While technologies such as DHCP claim dynamic addressing, the majority of network addresses currently deployed are static for at least a session. Dynamic addresses, changing multiple times within a session, disassociate a user with a static addr...
Conference Paper
The Battery-Sensing Intrusion Protection System (B-SIPS) [1] initially took a non-conventional approach to intrusion detection by recognizing attacks based on anomalous Instantaneous Current (IC) drain. An extension of B-SIPS, the Multi-Vector Portable Intrusion Detection System (MVP-IDS) validates the idea of recognizing attacks based on anomalous...
Article
Current implementations of the Internet Protocol version 6 (IPv6) use a static value determined from the Media Access Control (MAC) address as the host portion, or interface identifier (IID), of the IPv6 address. Some implementations create the IID using the MAC unobscured, while others compute a onetime hash value involving the MAC. As a result of...
Conference Paper
This paper provides insight into the ramifications of battery exhaustion Denial of Service (DoS) attacks on battery-powered mobile devices. Several IEEE 802.11 Wi-Fi, IEEE 802.15.1 Bluetooth, and blended attacks are studied to understand their effects on device battery lifetimes. In the worst case, DoS attacks against mobile devices were found to a...
Conference Paper
This paper discusses mobile device security and extends the original battery-sensing intrusion protection system (B-SIPS) (Buennemeyer, 2008) design by introducing the multi-vector portable intrusion detection system (MVP-IDS). MVP-IDS validates reported anomalous battery depletion from B-SIPS clients with real-time Wi-Fi and Bluetooth traffic usin...
Article
A Tablet PC combines all the features of a regular laptop computer with a digitizing screen that interacts with a complementary electronic pen stylus. The ability to annotate on a lecture presentation using the pen stylus of the Tablet PC has attracted the attention of academics to use them as a potential tool for effective classroom instruction. T...
Conference Paper
A Tablet PC combines all the features of a regular laptop computer with a digitizing screen that interacts with a complementary electronic pen stylus. The ability to annotate on a lecture presentation using the pen stylus of the Tablet PC has attracted the attention of academics to use them as a potential tool for effective classroom instruction. T...
Conference Paper
Full-text available
This paper extends Battery-Sensing Intrusion Protection System (B-SIPS) research by utilizing network simulations for deployment validation and optimization. The primary simulation goal is to ensure that B-SIPS does not negatively affect external applications in the network, as any drastic throughput degradation would severely lower the probability...
Conference Paper
A Tablet PC combines all the features of a regular laptop computer with a digitizing screen that interacts with a complementary electronic pen stylus. The ability to annotate on a lecture presentation using the pen stylus of the Tablet PC has attracted the attention of academics to use them as a potential tool for effective classroom instruction. T...
Conference Paper
Full-text available
With the advent of the information age, engineering educators have struggled to change pedagogical practice to prepare students for the pace and complexity of the world ahead. Constructivist instructional methods are particularly promising because they explicitly promote active evaluation of information and higher-order thinking, and encourage facu...
Article
Full-text available
This paper introduces capabilities developed for a Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts when abnormal current changes are detected. The intrusion detection system's (IDS's) IEEE 802.15.1 (Bluetooth) and 802.11 (Wi-Fi) capabilities are enhanced with iterative safe process checking, wireless connecti...
Conference Paper
Full-text available
Tablet PCs are one of the newest innovations in computing and communications tools, offering an opportunity to positively impact the way in which students and faculty use technology to support teaching and learning. In this three hour workshop faculty will receive a hands-on introduction to the use of several tablet-based software tools including O...
Conference Paper
Full-text available
Tablet PCs are one of the newest innovations in the computing and communications world and have the potential for significantly improving the way in which faculty members teach and the many different processes and mechanisms involved in student learning. After much discussion and experimentation, the Virginia Tech College of Engineering decided to...
Article
Full-text available
Educational technology has been shown to be an effective mechanism to foster improvements in pedagogical practices in the learning environment. In the fall of 2006, the Virginia Tech College of Engineering became the first and largest public college of engineering to require all 1400 incoming students to own a Tablet PC. The purpose of this require...
Conference Paper
Full-text available
This paper introduces a supporting model for a unique battery-sensing intrusion protection system (B-SIPS) for mobile computers, which alerts when power changes are detected on small wireless devices. An analytical model is employed to examine the smart battery characteristics to support the theoretical intrusion detection limits and capabilities o...
Conference Paper
Full-text available
This paper describes a unique battery-sensing intrusion protection system (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using an innovative Dynamic Threshold Calculation algorithm. B-SIPS enabled hosts are employed as sensors in a wireless network and form the basis of the intrusion detection syste...
Conference Paper
Tablet PCs are one of the newest innovations in the computing and communications world. These devices consist of a standard notebook PC configured with a screen (tablet/slate) which acts as both a display device as well as an input device. A stylus or pen can be used to input standard mouse-type commands as well as gesture commands and electronic i...
Conference Paper
Full-text available
This paper introduces a supporting model for a unique battery-sensing intrusion protection system (B-SIPS) for mobile computers, which alerts when power changes are detected on small wireless devices. An analytical model is employed to examine smart battery characteristics to support the theoretical intrusion detection limits and capabilities of B-...
Conference Paper
Summary form only given. This article focuses on the types of security problems that can occur in mobile wirelessly-connected systems, the solutions for known problems, and strategies for circumventing these problems in the future
Conference Paper
Full-text available
This paper proposes a pioneering Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using an innovative Dynamic Threshold Calculation algorithm. B-SIPS enabled hosts are employed as sensors in a wireless network and form the basis of the intrusion detection sy...
Conference Paper
Full-text available
Tablet PCs combine a standard notebook computer with a digitizing screen and a pen-like stylus device to produce a computer that allows ease of input of natural writing and drawing. The tool WriteOn was developed to allow the user to effectively draw on top of any application shown on the tablet PC screen. Conceptually set up as a virtual transpare...
Conference Paper
Full-text available
This paper proposes an innovative battery-sensing intrusion protection system (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices. These hosts are employed as sensors in a wireless network and form the basis of the "Canary-Net" intrusion detection system (IDS). This detection capability is scalable and co...
Article
In this talk we describe a new software package called WriteOn. By using this software on a tablet PC, instructors can significantly improve their classroom presentations and demonstrations.
Conference Paper
Full-text available
In this paper, we discuss an advance in technology-aided instruction. Not limited as in the past to PowerPoint-based or white board-centered electronic ink applications, the new tool, WriteOn, allows the instructor to use electronic ink to annotate on top of any application visible on the tablet PC display screen. WriteOn has been successfully used...
Conference Paper
In this talk we describe a new software package called WriteOn. By using this software on a tablet PC, instructors can significantly improve their classroom presentations and demonstrations.
Conference Paper
Full-text available
In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling pervasive computing systems gain a foothold presence in becoming more flexible and, at the same time, more invisibly interconnected, system users may have to trade privacy and p...
Conference Paper
Full-text available
This paper discusses best practices in the design, development and use of engineering education courseware by examining the courseware recognized through the Premier Award for Excellence in Engineering Education Courseware. Led by NEEDS - A Digital Library for Engineering Education and supported by industry, the courseware recognized through the Pr...
Article
Full-text available
This paper describes the experiences of using Tablet PCs along with associated software, such as Classroom Presenter and OneNote, in a course entitled Introduction to Computer Engineering. Twenty tablet PCs were distributed in a classroom of 40 students. Students used the tablets on a daily basis throughout the semester to take notes, to respond to...
Conference Paper
This paper reviews the literature on inter-organizational information systems. It has long beenargued that information technology can have profound effects on the structure and process of inter-firm relationships. This proposition has gained additional ...
Conference Paper
Full-text available
The emergence of the Web as a delivery mechanism for education has led a number of organizations to develop and implement quality evaluation cri- teria for digital learning resources and Web-based courses. The Chinese E- Learning Technology Standardization Committee is developing a specification for evaluating Web-based courses. This paper introduc...
Conference Paper
Full-text available
Daily commerce on the Internet consists of billions of dollars worth of transactions. Unfortunately, the Internet has become the lurking grounds for electronic n'er-do-wells who are constantly jeopardizing the processes of business. Recent network events throughout the world have caused people to become more and more hesitant to transact business o...
Article
Internet security is of utmost importance in today's e-commerce environment. Many different avenues are being taken in an attempt to secure the systems of both the end user as well as the server of information. The operating system, as well as application software, provide holes through which security is breached. One vulnerable part of the system...
Conference Paper
Full-text available
Broadband wireless technologies have the potential to provide integrated data and multimedia services in several niche areas. The rapid emergence of many new protocols in this area has created a growing need to develop high performance communication systems that can satisfy high-end data processing requirements inherent in these technologies within...
Conference Paper
Full-text available
Internet security is of utmost importance in today's e-commerce environment. Many different avenues are being taken in an attempt to secure the systems of both the end user as well as the server of information. The operating system, as well as application software, provide holes through which security is breached. One vulnerable part of the system...

Network

Cited By