{"id":"https://openalex.org/W2060003276","doi":"https://doi.org/10.1109/milcom.2011.6127498","title":"A Self-shielding Dynamic Network Architecture","display_name":"A Self-shielding Dynamic Network Architecture","publication_year":2011,"publication_date":"2011-11-01","ids":{"openalex":"https://openalex.org/W2060003276","doi":"https://doi.org/10.1109/milcom.2011.6127498","mag":"2060003276"},"language":"en","primary_location":{"id":"doi:10.1109/milcom.2011.6127498","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2011.6127498","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 - MILCOM 2011 Military Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000243766","display_name":"Justin Yackoski","orcid":null},"institutions":[{"id":"https://openalex.org/I4210130203","display_name":"Intelligent Automation (United States)","ror":"https://ror.org/02fwb6r86","country_code":"US","type":"company","lineage":["https://openalex.org/I4210130203"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Justin Yackoski","raw_affiliation_strings":["Intelligent, Automation, Inc., Rockville, MD, USA","Intelligent Automation, Inc., Rockville, MD, USA"],"affiliations":[{"raw_affiliation_string":"Intelligent, Automation, Inc., Rockville, MD, USA","institution_ids":["https://openalex.org/I4210130203"]},{"raw_affiliation_string":"Intelligent Automation, Inc., Rockville, MD, USA","institution_ids":["https://openalex.org/I4210130203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111383784","display_name":"Peng Xie","orcid":"https://orcid.org/0009-0009-3290-362X"},"institutions":[{"id":"https://openalex.org/I4210130203","display_name":"Intelligent Automation (United States)","ror":"https://ror.org/02fwb6r86","country_code":"US","type":"company","lineage":["https://openalex.org/I4210130203"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Xie","raw_affiliation_strings":["Intelligent, Automation, Inc., Rockville, MD, USA","Intelligent Automation, Inc., Rockville, MD, USA"],"affiliations":[{"raw_affiliation_string":"Intelligent, Automation, Inc., Rockville, MD, USA","institution_ids":["https://openalex.org/I4210130203"]},{"raw_affiliation_string":"Intelligent Automation, Inc., Rockville, MD, USA","institution_ids":["https://openalex.org/I4210130203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066277638","display_name":"Harry Bullen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210130203","display_name":"Intelligent Automation (United States)","ror":"https://ror.org/02fwb6r86","country_code":"US","type":"company","lineage":["https://openalex.org/I4210130203"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Harry Bullen","raw_affiliation_strings":["Intelligent, Automation, Inc., Rockville, MD, USA","Intelligent Automation, Inc., Rockville, MD, USA"],"affiliations":[{"raw_affiliation_string":"Intelligent, Automation, Inc., Rockville, MD, USA","institution_ids":["https://openalex.org/I4210130203"]},{"raw_affiliation_string":"Intelligent Automation, Inc., Rockville, MD, USA","institution_ids":["https://openalex.org/I4210130203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100762970","display_name":"Jason Li","orcid":"https://orcid.org/0000-0002-1150-3549"},"institutions":[{"id":"https://openalex.org/I4210130203","display_name":"Intelligent Automation (United States)","ror":"https://ror.org/02fwb6r86","country_code":"US","type":"company","lineage":["https://openalex.org/I4210130203"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jason Li","raw_affiliation_strings":["Intelligent, Automation, Inc., Rockville, MD, USA","Intelligent Automation, Inc., Rockville, MD, USA"],"affiliations":[{"raw_affiliation_string":"Intelligent, Automation, Inc., Rockville, MD, USA","institution_ids":["https://openalex.org/I4210130203"]},{"raw_affiliation_string":"Intelligent Automation, Inc., Rockville, MD, USA","institution_ids":["https://openalex.org/I4210130203"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026728546","display_name":"Kun Sun","orcid":"https://orcid.org/0000-0003-4152-2107"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kun Sun","raw_affiliation_strings":["George Mason University, Fairfax, VA, USA","George Mason University Fairfax VA USA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]},{"raw_affiliation_string":"George Mason University Fairfax VA USA","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5000243766"],"corresponding_institution_ids":["https://openalex.org/I4210130203"],"apc_list":null,"apc_paid":null,"fwci":1.4003,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.82272625,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1381","last_page":"1386"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.7501070499420166},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.728463888168335},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.7060909271240234},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.5263988971710205},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4569767415523529},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45375514030456543},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.4432690441608429}],"concepts":[{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.7501070499420166},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.728463888168335},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.7060909271240234},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.5263988971710205},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4569767415523529},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45375514030456543},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.4432690441608429},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom.2011.6127498","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2011.6127498","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 - MILCOM 2011 Military Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6499999761581421,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320338294","display_name":"Air Force Research Laboratory","ror":"https://ror.org/02e2egq70"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1579544547","https://openalex.org/W1597781460","https://openalex.org/W1900659317","https://openalex.org/W1972625529","https://openalex.org/W2140471436","https://openalex.org/W2252720173","https://openalex.org/W2286477783","https://openalex.org/W2551880012","https://openalex.org/W4232271737","https://openalex.org/W6729561274","https://openalex.org/W6814336774"],"related_works":["https://openalex.org/W2883256816","https://openalex.org/W2171408034","https://openalex.org/W3003320923","https://openalex.org/W2106140982","https://openalex.org/W2152313554","https://openalex.org/W2064303750","https://openalex.org/W4285042611","https://openalex.org/W1509300825","https://openalex.org/W3092582874","https://openalex.org/W3139395509"],"abstract_inverted_index":{"The":[0],"current":[1],"static":[2],"nature":[3,104],"of":[4,26,76,105,127,151,168,208],"computer":[5,33],"networks":[6],"allows":[7,124],"attackers":[8],"to":[9,48,57,102,129,148,174,181,190,196],"gather":[10],"intelligence,":[11],"perform":[12],"planning,":[13],"and":[14,28,67,88,95,144,157,177],"then":[15],"execute":[16],"attacks":[17,209],"at":[18],"will.":[19],"This":[20],"situation":[21],"creates":[22],"a":[23,49,59,99,117,141,169],"low":[24],"barrier":[25],"entry":[27],"assures":[29],"that":[30],"any":[31],"given":[32],"network":[34,107,143,193],"will":[35],"eventually":[36,63],"be":[37,130,188,211],"successfully":[38],"attacked.":[39],"In":[40,112],"particular,":[41],"once":[42],"an":[43,52,77,163,191],"attacker":[44,61,91],"has":[45],"gained":[46],"access":[47],"node":[50],"within":[51,69],"enclave,":[53],"there":[54],"is":[55,92,172,178],"little":[56,195],"stop":[58],"determined":[60],"from":[62],"accessing":[64],"other":[65],"hosts":[66],"services":[68],"the":[70,74,80,85,90,103,106,152,166,175,182,203],"enclave.":[71],"To":[72],"reduce":[73],"impact":[75],"attack":[78,86],"in":[79,140],"time":[81],"frame":[82],"between":[83],"when":[84,89],"begins":[87],"(eventually)":[93],"detected":[94],"removed,":[96],"we":[97,115],"propose":[98],"fundamental":[100],"change":[101],"by":[108,161,218],"introducing":[109],"cryptographically-strong":[110],"dynamics.":[111],"this":[113],"work,":[114],"describe":[116],"Self-shielding":[118],"Dynamic":[119],"Network":[120],"Architecture":[121],"(SDNA)":[122],"which":[123],"multiple":[125],"types":[126],"dynamics":[128],"constructively":[131],"combined.":[132],"We":[133],"have":[134,145],"implemented":[135],"SDNA":[136,147,171,185],"on":[137],"real":[138],"hardware":[139],"testbed":[142],"designed":[146],"eliminate":[149],"many":[150,206],"technical":[153],"challenges,":[154],"user":[155],"impacts,":[156],"compatibility":[158],"issues":[159],"faced":[160],"such":[162],"architecture.":[164],"Through":[165],"use":[167],"hypervisor,":[170],"transparent":[173],"OS":[176],"not":[179],"noticeable":[180],"average":[183],"user.":[184],"can":[186,210],"also":[187],"added":[189],"existing":[192],"with":[194],"no":[197],"infrastructure":[198],"or":[199,215],"configuration":[200],"changes.":[201],"At":[202],"same":[204],"time,":[205],"classes":[207],"either":[212],"completely":[213],"prevented":[214],"severely":[216],"limited":[217],"SDNA.":[219]},"counts_by_year":[{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":10},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-25T21:42:39.735039","created_date":"2025-10-10T00:00:00"}
