An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
Shuvo Bardhan, Mitsuhiro Hatada, James Filliben, Douglas Montgomery, Alexander Jia
In this paper, we present an evaluation procedure for comparing multiple netflow based network anomaly detection (NF-NAD) systems based on accuracy of detection
Douglas C. Montgomery, Mark E. Carson, Timothy Winters, Michayla Newcombe, Timothy Carlin
This profile establishes a basic taxonomy of IPv6 capabilities, defined in terms of IETF specifications, resulting in specific capability labels for common
The NISTv6 Capabilities Table (NCT) provides a concise tabular summary of the technical requirements of the NISTv6 profile. For ease of reference, the NCT is
The USGv6 Capabilities Table (UCT) provides a concise tabular summary of the technical requirements of the USGv6 profile. For ease of reference, the UCT is
Douglas C. Montgomery, Mark E. Carson, Timothy Winters, Michayla Newcombe, Timothy Carlin
This profile establishes a basic taxonomy of IPv6 capabilities, defined in terms of IETF specifications, resulting in specific capability labels for common
The USGv6 Profile SDoC captures the results of conformance, interoperability and functional tests conducted and provides traceability back to the accredited
Douglas C. Montgomery, Erica Johnson, Michayla Newcombe, Timothy Winters
This document defines the scope of accreditation for the USGv6 Test program, including test method validation procedures, laboratory accreditation process and
Douglas C. Montgomery, Erica Johnson, Michayla Newcombe, Timothy Winters
This document outlines the form and function of the USGv6 Test Program. In particular, it defines the components of the test program, their implementation and
In recent years, numerous routing control plane anomalies, such as Border Gateway Protocol (BGP) prefix hijacking and route leaks, have resulted in denial-of
William A. Haag Jr., Douglas C. Montgomery, Allen Y. Tan, William C. Barker
The Border Gateway Protocol (BGP) is the default routing protocol to route traffic among internet domains. While BGP performs adequately in identifying viable
An Wang, Zili Zha, Yang Guo, Douglas C. Montgomery, Songqing Chen
Botnets continue to be one of the most severe security threats plaguing the Internet. Recent years have witnessed the emergence of cloud-hosted botnets along
Shuvo Bardhan, Douglas C. Montgomery, James J. Filliben, Nathanael A. Heckert
Externally-launched computer worms which maliciously propagate within networks are one of the most serious and dangerous security threats facing the commercial
Zili Zha, An Wang, Yang Guo, Douglas C. Montgomery, Songqing Chen
The recent advances on Software-Defined Networking (SDN) have made flexible and programmable network measurement possible. A promising trend is to conduct
An Wang, Yang Guo, Songqing Chen, Fang Hao, T.V. Lakshman, Douglas C. Montgomery, Kotikalapudi Sriram
Network programmability is a salient feature of Software Defined Networking (SDN), which allows users to program network applications with the perception that
The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically
Kotikalapudi Sriram, Oliver Borchert, Patrick Gleichmann, Douglas C. Montgomery
We present an evaluation methodology for comparison of existing and proposed new algorithms for Border Gateway Protocol (BGP) anomaly detection and robustness
Kotikalapudi Sriram, Young-Tak Kim, Douglas C. Montgomery
In this paper, we present a discussion of some architectural ideas pertaining to the mapping distribution protocol. The efficiency of this protocol in terms of
Douglas C. Montgomery, J. S. Nightingale, Sheila E. Frankel, Mark E. Carson
This publication seeks to assist Federal agencies in formulating plans for the acquisition of IPv6 technologies. To achieve this, we define a standards profile
David R. Kuhn, Kotikalapudi Sriram, Douglas C. Montgomery
This document introduces the Border Gateway Protocol (BGP), explains its importance to the internet, and provides a set of best practices that can help in
Jean Deruelle, Mudumbai Ranganathan, Douglas C. Montgomery
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the
Kotikalapudi Sriram, Douglas C. Montgomery, Oliver Borchert, Okhee Kim, David R. Kuhn
We present a detailed study of the potential impact of BGP peering session attacks and the resulting exploitation of Route Flap Damping (RFD) that cause network
Kotikalapudi Sriram, Douglas C. Montgomery, Oliver Borchert, Okhee Kim, David R. Kuhn
BGP peering session attacks are known to drive routes into route flap damping (RFD) suppression states and thus cause isolations between autonomous systems
M K. Shin, Darrin J. Santay, Douglas C. Montgomery
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric