Papers by Isil Sebuktekin
The DARPA LADS program uses unintended emissions, including RF emissions, to try to determine the... more The DARPA LADS program uses unintended emissions, including RF emissions, to try to determine the internal state of a digital device. The CASPER project uses a combination of digital signal processing and machine learning in order to discover changes of state that may indicate unwanted activity on the device. In this paper, we will discuss our recent experiences fielding the CASPER system as part of the DARPA RADICS exercise. The RADICS program is building the tools necessary to recover from a catastrophic attack on the cyber assets of the electrical grid. CASPER provides a complementary technology for discovering which assets are performing anomalously to help speed remediation efforts. The RADICS exercise lasted 7 days and is conducted on a live electrical grid in a remote area. The design of the exercise is to provide a high degree of realism including no Internet access and limited access to supplies not already on site.
Recent advances in optical communications, VLSI, and fiber-optic technologies have created new ho... more Recent advances in optical communications, VLSI, and fiber-optic technologies have created new horizons for high-speed protocols and applications seeking end-to-end data transport at Gb/s speeds. In this Ph.D dissertation, an itemized goodness definition consisting of six criteria is presented for evaluation of high speed transport protocols used in lightweight networking applications. Based on this goodness definition, a goodness measure is also defined in this dissertation to quantify the relative goodness of existing and future transport protocols. The goodness definition has been developed and enhanced as a result of analysis and characterization of nine transport protocols: 1) Delta-t, 2) Datakit Universal Receiver Protocol (Datakit URP), 3) Transmission Control Protocol (TCP), 4) Versatile Message Transaction Protocol (VMTP), 5) Open Systems Interconnection Transport Protocol Class 4 (OSI/TP4), 6) Network Block Transfer Protocol (NETBLT), 7) Express Transfer Protocol (XTP), 8)...
Recent advances in optical communications, VLSI, and fiber-optic technologieshave created new hor... more Recent advances in optical communications, VLSI, and fiber-optic technologieshave created new horizons for high-speed protocols and applicationsseeking end-to-end data transport at Gb/s speeds. In this Ph.D dissertation, anitemized goodness definition consisting of six criteria is presented for evaluationof high speed transport protocols used in lightweight networking applications.Based on this goodness definition, a goodness measure is also defined in thisdissertation to
Proceedings of ICNP - 1994 International Conference on Network Protocols, 2000
We present a novel technique called symbolic simulation, and its application to protocol modeling... more We present a novel technique called symbolic simulation, and its application to protocol modeling and validation. Whereas simulation produces a trace of the behavior of a system for certain fixed parameter values, symbolic simulation allows one to simulate the behavior of a system for entire ranges of parameter values. This in turn allows verification of certain properties of the system behavior for those ranges of values. This paper lays the theoretical foundation for symbolic simulation, and describes its application to proving safety and liveness properties of protocols. As an example, we have modeled a timer-based connection management protocol and validated one of its safety properties. We conclude that symbolic simulation is a useful means for modeling and validation of complex, real-time communication protocols
2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2015
IEEE Wireless Communications and Networking Conference, 2005, 2005
The integrated networking technology prototype demonstrates the capability of several emerging ne... more The integrated networking technology prototype demonstrates the capability of several emerging networking technologies to operate together seamlessly to enhance network services targeted for dynamic mobile environments such as those found in the battlefield. The prototype consists of four technologies: (1) autoconfiguration technology supports autonomous and rapid network deployment and configuration; (2) self-managed virtual network (SMVN) technology provides virtual networking capabilities
Proceedings of the 5th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing, 2009
Border Gateway Protocol (BGP) is the inter-domain routing protocol of choice across the Global In... more Border Gateway Protocol (BGP) is the inter-domain routing protocol of choice across the Global Information Grid (GIG) as in the commercial Internet. There is a future need and motivation to extend BGP to connect the large-scale future military networks of the Army, Navy and Air Force to the GIG as independent Autonomous Systems (ASes) using satellite and wide area networking
MILCOM 2002. Proceedings, 2002
Admission control of applications into each service class based on the bandwidth capacity allocat... more Admission control of applications into each service class based on the bandwidth capacity allocated to each service class and its particular QoS objectives that sufficiently adapt to the dynamic state of the underlying network which could be a highly mobile ad-hoc network in a lossy wireless environment. In this paper, we discuss empirical, analytical and simulation-based performance studies for an integrated IP QoS architecture implementing QoS resource management over a heterogeneous wireless and wireline network. The intearated IP 00s architecture is based on Assured I-Forwarding (class-based) Differentiated Services and The very early design and implementation specifics of our admission control of individual flows into each service integrated IP QoS architecture are discussed in [5], [6]. class by a centralized server, called the Bandwidth Broker There have been significant modifications to the (BB) managing the network. The results we present in this architecture to support multi-class services and ad hoc paper are used as guidelines in designing the capacity wireless environments, which we will detail in an estimation algorithm for admission control and optimizing upcoming publication. QoS resource management within our integrated IP QoS architecture. These results serve as an instrument to understanding how to perform effective QoS resource management, using class-based differentiated services and admission control to guarantee class-appropriate end-toend QoS over IP networks.
2013 IEEE 7th International Conference on Self-Adaptation and Self-Organizing Systems Workshops, 2013
We describe and demonstrate fully distributed algorithms that enable cloud clients to select amon... more We describe and demonstrate fully distributed algorithms that enable cloud clients to select among a set of available computing clusters adaptively, based on measurements of cluster computing loads and the relative bandwidths of paths between the client and each cluster. These techniques are particularly important in cases where (1) clients connect to clusters over stressed wireless networks whose characteristics vary considerably over time, and (2) cloud computing resources are physically dispersed over several locations to improve robustness against physical attack, power failure, network failure, or cyber attack. We demonstrate new means of measuring path bandwidth reliably over multi-hop wireless networks. We then show how the resulting network awareness can be combined with available data on cluster computing loads to arrive at favorable cluster selection decisions by cloud clients, without the need for a centralized cloud controller.
Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07), 2007
... Fig. 1. QoS and OLSR MANET demo network 2.1 DiffServ routers ... We use it to generate aggres... more ... Fig. 1. QoS and OLSR MANET demo network 2.1 DiffServ routers ... We use it to generate aggressive UDP/IP cross-traffic that fully congests the 802.11b bandwidth, which is treated as best effort traffic. Smoke sensor alarm simulating NBC alert. ...
International Journal of Network Management, 1998
A key result of these empirical studies is the requirement to configure adequate buffer space in ... more A key result of these empirical studies is the requirement to configure adequate buffer space in customer premises equipment, which has a DS1 bottleneck itself or which sends data to a DS1 bottleneck in the FR/ATM interworking equipment. As long as such care is exercised, the DS3-to-DS1 rate mismatch does not negatively impact TCP/IP performance over FR/ATM Service Interworking. Although cell drops occur due to the large speed mismatch, TCP's flow and congestion control Dr Sebü ktekin has been a research scientist at Bellcore since 1992. Her main research interests are in computer networking, particularly on IP networking, routing, performance testing, and Internet metrics, measurement tools, and methodologies. Her interests include end-toend TCP performance testing on IP and ATM networks and interoperability of various access technologies and internetworking protocols.
Computer Communications, 1998
This paper outlines some basic performance characteristics of the Transmission Control Protocol/I... more This paper outlines some basic performance characteristics of the Transmission Control Protocol/Internet Protocol (TCP/IP) over Asynchronous Transfer Mode (ATM). It also discusses a few solutions to assure acceptable TCP/IP performance over ATM which are implemented by the industry during the last couple of years. The conclusions in this paper are based on empirical TCP/IP performance test results collected on a DS3 ATM research testbed, architected with commercially available IP and ATM equipment 2. TCP/IP performance can vary widely and suffer significantly over ATM networks with large bandwidth*delay products. First, it is essential that the TCP window size matches the bandwidth*delay product of the end-to-end connection to fully utilize the bandwidth provided by the broadband network. Even if the window size meets this criteria, TCP performance can still be unacceptable, especially if the buffering within the ATM network is limited. A single limited-buffer bottleneck is sufficient to degrade the performance of a TCP connection when multiple traffic sources congest the bottleneck resource, such as in ATM networks with small buffer switches. One approach to assure acceptable TCP/IP performance is to limit the data rate into the bottleneck resource by exercising rate control at the entry to the ATM network. A better solution is to provide sufficient buffering within the ATM network.
MILCOM 2008 - 2008 IEEE Military Communications Conference, 2008
... Leyla Fulya Filiz Rcvr Test No. No of GS Flows No of CL Flows Total No of Flows Flow Inter. .... more ... Leyla Fulya Filiz Rcvr Test No. No of GS Flows No of CL Flows Total No of Flows Flow Inter. ... We exercise RSVP's flow merge and split capabilities on adjacent peers Selma and Leyla outside the aggregation region, which also seem to be process-intense functions. ...
Uploads
Papers by Isil Sebuktekin