Publications

REVEAL: Real-time Evaluation and Verification of External Adversarial Links

Abstract

Department of Defense (DOD) use of commercial networks entails unprecedented reliance on untrusted third-party communications infrastructure, and the associated risk of exposing DOD communications to an adversary. Traversing adversary-controlled infrastructure allows DOD’s adversaries to recognize, disrupt, or extract intelligence even from encrypted communications. The resulting arms race of obfuscation vs intelligence techniques has an inherent limitation: with each new obfuscation, DOD can never know if it fools the adversary, or if the adversary is simply lulling DOD into a false sense of security.We believe the next great capability leap for operating through commercial networks will likely come from sophisticated analytics that provide situational awareness of the threats within the communications infrastructure, and implementations that dynamically route communications along benign paths. These …

Date
October 28, 2024
Authors
Alexander Marder, Jon Larrea, Kc Claffy, Erik Kline, Kyle Jamieson, Bradley Huffaker, Lincoln Thurlow, Matthew Luckie
Conference
MILCOM 2024-2024 IEEE Military Communications Conference (MILCOM)
Pages
1106-1111
Publisher
IEEE