Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Author: Peter Mell

Displaying records 1 to 10 of 41 records.
Resort by: Date / Title


1. Linear Time Vertex Partitioning on Massive Graphs
Published: 3/7/2016
Authors: Peter M Mell, Richard Harang, Assane Gueye
Abstract: The problem of optimally removing a set of vertices from a graph to minimize the size of the largest resultant component is known to be NP-complete. Prior work has provided near optimal heuristics with a high time complexity that function on up to hu ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919446

2. On the Internet Connectivity in Africa
Published: 11/19/2015
Authors: Assane Gueye, Peter M Mell, Desire Banse, Faical Yannick Palingwende Congo
Abstract: This study measures and documents growth of Internet connectivity in Africa from 2010 to 2014 with a focus on inter-country relationships. We evaluate both intra-continent connectivity as well as connectivity to other continents. An initial analy ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919630

3. Minimizing Attack Graph Data Structures
Published: 11/15/2015
Authors: Peter M Mell, Richard Harang
Abstract: An attack graph is a data structure representing how an attacker can chain together multiple attacks to expand their influence within a network (often in an attempt to reach some set of goal states). Restricting attack graph size is vital for the exe ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917681

4. Defensive Resource Allocations with Security Chokepoints in IPv6 Networks
Published: 7/15/2015
Authors: Assane Gueye, Peter M Mell, Richard Harang, Richard J La
Abstract: Securely configured Internet Protocol version 6 networks can be made resistant to network scanning, forcing attackers to propagate following existing benign communication paths. We exploit this attacker limitation in a defensive approach in which ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917943

5. Measuring Limits on the Ability of Colluding Countries to Partition the Internet
Published: 6/30/2015
Authors: Peter M Mell, Richard Harang, Assane Gueye
Abstract: We show that the strength of Internet-based network interconnectivity of countries is increasing over time. We then evaluate bounds on the extent to which a group of colluding countries can disrupt this connectivity. We evaluate the degree to which a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918270

6. Evasion-Resistant Network Scan Detection
Published: 5/9/2015
Authors: Richard Harang, Peter M Mell
Abstract: Popular network scan detection algorithms operate through evaluating external sources for unusual connection patterns and traffic rates. Research has revealed evasive tactics that enable full circumvention of existing approaches (specifically the wid ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915071

7. The Resilience of the Internet to Colluding Country Induced Connectivity Disruptions
Published: 3/3/2015
Authors: Peter M Mell, Richard Harang, Assane Gueye
Abstract: We show that the strength of Internet-based network interconnectivity of countries is increasing over time. We then evaluate bounds on the extent to which a group of colluding countries can disrupt this connectivity. We evaluate the degree to which a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916394

8. Lightweight Packing of Log Files for Improved Compression in Mobile Tactical Networks
Published: 10/8/2014
Authors: Peter M Mell, Richard Harang
Abstract: Devices in mobile tactical edge networks are often resource constrained due to their lightweight and mobile nature, and often have limited access to bandwidth. In order to maintain situational awareness in the cyber domain, security logs from these d ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915734

9. Reducing the Cognitive Load on Analysts Through Hamming Distance Based Alert Aggregation
Published: 9/30/2014
Authors: Peter M Mell, Richard Harang
Abstract: Previous work introduced the idea of grouping alerts at a Hamming distance of 1 to achieve alert aggregation; such aggregated meta-alerts were shown to increase alert interpret-ability. However, a mean of 84,023 daily Snort alerts were reduced to a s ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915437

10. Using Network Tainting to Bound the Scope of Network Ingress Attacks
Published: 7/1/2014
Authors: Peter M Mell, Richard Harang
Abstract: This research describes a novel security metric, network taint, which is related to software taint analysis. We use it here to bound the possible malicious influence of a known compromised node through monitoring and evaluating network flows. The res ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915123



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series