publications: - title: "On Respecting Interdependence Between Queuing Policy and Message Value" author: - name: "John Hershey" link: "https://researchr.org/alias/john-hershey" - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "1999" month: "Dec" abstract: "Dynamic reprioritization of a message based on simple heuristics and the knowledge of already sent messages, messages in queue, and, perhaps, messages expected should be a element of consideration for intelligent networks supporting those endeavors that may well expect stressed and degraded communications capacity. Additionally, the use of simple computational heuristics may serve well in effecting admittedly suboptimal but highly efficacious queuing policies. The discipline of active networks is suggested as an appropriate superfield for cabining these activities." links: "url": "http://www.research.ge.com/~bushsf" tags: - "rule-based" researchr: "https://researchr.org/publication/Hershey1999" cites: 0 citedby: 0 institution: "General Electric Research and Development" number: "99CRD151" kind: "techreport" key: "Hershey1999" - title: "Extended Abstract: Complexity and Vulnerability Analysis" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2003" month: "Jun" abstract: "An active network allows packets to contain a mixture of code (algorithm) and data. The ratio of code to data can vary as the packet travels through the network. Such networks can also be vulnerable to attack via the transport of virus or worm code. A mitigation of this problem has been attempted via the use of active network probes to detect vulnerabilities in an active network. A complexity estimate of active protocols being transported within the network by active packets is obtained. In addition components within the active network contain probe points through which bit-level I/O can be collected. Kolmogorov Complexity estimates based upon simple inverse compression ratios have used to estimate vulnerability. The intent has been to experiment with better complexity measures as the research continues. Consider the complexity of bit-level input and output strings concatenated together. That is, observe an input sequence to an arbitrary process (i.e. a potentially vulnerable process) at the bit-level and concatenate with an output sequence at the bit-level. This input/output concatenation can be applied to entire systems or to components of a system. If there is low complexity in the I/O observations, then it is likely to be easy for an attacker to \"understand\" and usurp that component." links: "url": "http://www.research.ge.com/~bushsf" tags: - "rule-based" - "protocol" - "points-to analysis" - "analysis" - "Kolmogorov complexity" - "data-flow" - "source-to-source" - "data-flow analysis" - "open-source" researchr: "https://researchr.org/publication/Bush2003h" cites: 0 citedby: 0 booktitle: "Complexity and Inference" kind: "inproceedings" key: "Bush2003h" - title: "Active Virtual Network Management Prediction" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "1999" month: "May" abstract: "This paper introduces a novel algorithm, the Active Virtual Network Management Prediction (AVNMP), for predictive network management. It explains how the AVNMP facilitates the management of an active network by allowing future predicted state information within an active network to be available to network management algorithms. This is accomplished by coupling ideas from optimistic discrete event simulation with active networking. The optimistic discrete event simulation method used is a form of self-adjusting Time Warp. It is self-adjusting because the system adjusts for predictions which are inaccurate beyond a given tolerance. The concept of a streptichron and autoanaplasis are introduced as mechanisms which take advantage of the enhanced flexibility and intelligence of active packets. Finally, it is demonstrated that the AVNMP is a feasible concept." links: "url": "http://www.research.ge.com/~bushsf" researchr: "https://researchr.org/publication/Bush1999b" cites: 0 citedby: 0 booktitle: "PADS '99" kind: "inproceedings" key: "Bush1999b" - title: "An Active Model-Based Prototype for Predictive Network Management" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Sanjay Goel" link: "https://researchr.org/alias/sanjay-goel" year: "2005" month: "Nov" abstract: "If current trends continue, the next generation of enterprise networks is likely to become a more complex mixture of hardware, communication media, architectures, protocols, and standards. One approach toward reducing the management burden caused by growing complexity is to integrate management support into the inherent function of network operation. In this paper, management support is provided in the form of network components that, simultaneously with their network function, collaboratively project and adjust projections of future state based upon actual network state. It is well known that more accurate predictions over a longer time horizon enables better control decisions. This paper focuses upon improving prediction; the many potential uses of predictive capabilities for predictive network control will be addressed in future work." links: "url": "http://www.research.ge.com/~bushsf" tags: - "rule-based" - "protocol" - "architecture" - "systematic-approach" researchr: "https://researchr.org/publication/Bush2005m%3A0" cites: 0 citedby: 0 journal: "IEEE Journal on Selected Areas in Communications Journal" volume: "23" number: "10" kind: "article" key: "Bush2005m:0" - title: "Nano-Communications: A New Field? An Exploration into a Carbon Nanotube Communication Network" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Yun Li" link: "https://researchr.org/alias/yun-li" year: "2006" month: "February" abstract: "Imagine a communication network constructed at a nanometer scale. This paper examines the potential benefits from the perspective of using individual nanotubes within random carbon nanotube networks (CNT) to carry information. This is distinct from traditional, potentially less efficient, approaches of using CNT networks to construct transistors. The traditional networking protocol stack is inverted in this approach because, rather than the network layer being logically positioned above the physical and link layers, the CNT network and routing of information is an integral part of the physical layer. Single-walled carbon nanotubes (SWNT) are modelled as linear tubes positioned in two dimensions via central coordinates with a specified angle. A distribution of lengths and angles may be specified. A network graph is extracted from the layout of the tubes and the unprecedented ability to route information close to the level of individual nanotubes is considered. The impact of random tube characteristics, such as location and angle, upon the corresponding network graph and its impacts are examined." links: "url": "http://www.research.ge.com/\\~{}bushsf/pdfpapers/2006GRC066\\_Final\\_ver.pdf" tags: - "layout" - "meta-model" - "protocol" - "graph-rewriting" - "information models" - "Meta-Environment" - "rewriting" - "routing" - "systematic-approach" researchr: "https://researchr.org/publication/Bush2006" cites: 0 citedby: 0 institution: "GE Global Research" number: "2006GRC066" kind: "techreport" key: "Bush2006" - title: "Mobile ATM Buffer Capacity Analysis" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Joseph B. Evans" link: "https://researchr.org/alias/joseph-b.-evans" - name: "Victor Frost" link: "https://researchr.org/alias/victor-frost" year: "1996" month: "February" abstract: "This paper extends a stochastic theory for buffer fill distribution for multiple ``on'' and ``off'' sources to a mobile environment. Queue fill distribution is described by a set of differential equations assuming sources alternate asynchronously between exponentially distributed periods in ``on'' and ``off'' states. This paper includes the probabilities that mobile sources have links to a given queue. The sources represent mobile user nodes, and the queue represents the capacity of a switch. This paper presents a method of analysis which uses mobile parameters such as speed, call rates per unit area, cell area, and call duration and determines queue fill distribution at the ATM cell level. The analytic results are compared with simulation results." links: "url": "http://www.crd.ge.com/people/bush" tags: - "points-to analysis" - "analysis" - "source-to-source" - "Meta-Environment" - "mobile" - "open-source" - "meta-objects" researchr: "https://researchr.org/publication/Bush1996b" cites: 0 citedby: 0 journal: "ACM-Baltzer Mobile Networks and Nomadic Applications (NOMAD)" volume: "1" number: "1" kind: "article" key: "Bush1996b" - title: "A Control and Management Network for Wireless ATM Systems" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Sunil Jagannath" link: "https://researchr.org/alias/sunil-jagannath" - name: "Joseph B. Evans" link: "https://researchr.org/alias/joseph-b.-evans" - name: "Victor Frost" link: "https://researchr.org/alias/victor-frost" year: "1996" month: "June" abstract: "This work provides the results of the on-going design and implementation of a control and management network (an orderwire) for a mobile wireless ATM system. There are novel uses for an orderwire which receives time and position from the Global Positioning System (GPS). Position information is used for such things as beam steering and determination of switch to host associations. The accurate time provided by the GPS is used by the network configuration system for a proposed rapid configuration algorithm." links: "url": "http://www-ee.uta.edu/organizations/commsoc/commsoft.html" tags: - "control systems" - "design" - "mobile" researchr: "https://researchr.org/publication/Bush1996%3A0" cites: 0 citedby: 0 booktitle: "Proceedings of the International Communications Conference '96" kind: "inproceedings" key: "Bush1996:0" - title: "A Simple Metric for Ad Hoc Network Adaptation" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2005" month: "Dec" abstract: "This paper examines flexibility in ad hoc networks and suggests that, even with cross-layer design as a mechanism to improve adaptation, a fundamental limitation exists in the ability of a single optimization function, defined a priori, to adapt the network to meet all quality-of-service requirements. Thus, code implementing multiple algorithms will have to be positioned within the network. Active networking and programmable networking enable unprecedented autonomy and flexibility for ad hoc communication networks. However, in order to best leverage the results of active and programmable networking, metrics that indicate the nature and location of required flexibility need to be developed. The primary contribution of this paper is to propose a metric that couples network topological rate of change with the ability of a generic service to move itself to an optimal location in concert with the changing network. This metric points to a fundamental tradeoff among adaptation (changing service location), performance (sophistication or estimated minimum code size of the service), and the networkâ??s ability to tune itself to a changing ad hoc network topology." links: "url": "http://www.research.ge.com/~bushsf" tags: - "optimization" - "generic programming" - "program optimization" - "design" researchr: "https://researchr.org/publication/Bush2005g" cites: 0 citedby: 0 journal: "IEEE Journal on Selected Areas in Communications Journal" volume: "23" number: "12" kind: "article" key: "Bush2005g" - title: "Brittle System Analysis" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "John Hershey" link: "https://researchr.org/alias/john-hershey" - name: "Kirby Vosburgh" link: "https://researchr.org/alias/kirby-vosburgh" year: "1999" month: "Apr" abstract: "The goal of this paper is to define and analyze systems which exhibit brittle behavior. This behavior is characterized by a sudden and steep decline in performance as the system state changes. This can be due to input parameters which exceed a specified input, or environmental conditions which exceed specified operating boundaries." links: "url": "http://www.research.ge.com/~bushsf" tags: - "operating system" - "analysis" researchr: "https://researchr.org/publication/Bush1999" cites: 0 citedby: 0 kind: "article" key: "Bush1999" - title: "Active Networks and Active Network Management: A Proactive Management Framework" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Amit B. Kulkarni" link: "https://researchr.org/alias/amit-b.-kulkarni" year: "2001" abstract: "Active networking is an exciting new paradigm in digital networking that has the potential to revolutionize the manner in which communication takes place. It is an emerging technology, one in which new ideas are constantly being formulated and new topics of research are springing up even as this book is being written. This technology is very likely to appeal to a broad spectrum of users from academia and industry. Therefore, this book was written in a way that enables all these groups to understand the impact of active networking in their sphere of interest. Information services managers, network administrators, and e-commerce developers would like to know the potential benefits of the new technology to their businesses, networks, and applications. The book introduces the basic active networking paradigm and its potential impacts on the future of information handling in general and on communications in particular. This is useful for forward-looking businesses that wish to actively participate in the development of active networks and ensure a head start in the integration of the technology in their future products, be they applications or networks. Areas in which active networking is likely to make significant impact are identified, and the reader is pointed to any related ongoing research efforts in the area. The book also provides a deeper insight into the active networking model for students and researchers, who seek challenging topics that define or extend frontiers of the technology. It describes basic components of the model, explains some of the terms used by the active networking community, and provides the reader with taxonomy of the research being conducted at the time this book was written. Current efforts are classified based on typical research areas such as mobility, security, and management. The intent is to introduce the serious reader to the background regarding some of the models adopted by the community, to outline outstanding issues concerning active networking, and to provide a snapshot of the fast-changing landscape in active networking research. Management is a very important issue in active networks because of its open nature. The latter half of the book explains the architectural concepts of a model for managing active networks and the motivation for a reference model that addresses limitations of the current network management framework by leveraging the powerful features of active networking to develop an integrated framework. It also describes a novel application enabled by active network technology called the Active Virtual Network Management Prediction (AVNMP) algorithm. AVNMP is a proactive management system; in other words, it provides the ability to solve a potential problem before it impacts the system by modeling network devices within the network itself and running that model ahead of real time." links: "url": "http://www.research.ge.com/~bushsf" tags: - "rule-based" - "application framework" - "meta-model" - "modeling" - "architecture" - "model-driven development" - "source-to-source" - "security" - "e-science" - "information models" - "Meta-Environment" - "taxonomy" - "open-source" researchr: "https://researchr.org/publication/Bush2001" cites: 0 citedby: 0 publisher: "Kluwer Academic/Plenum Publishers" isbn: "0-306-46560-4" kind: "book" key: "Bush2001" - title: "Thought Communication" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Amit B. Kulkarni" link: "https://researchr.org/alias/amit-b.-kulkarni" year: "2001" month: "Mar" links: "url": "http://www.hpcc.gov/iwg/lsn/lsn-workshop-12mar01/" researchr: "https://researchr.org/publication/Bush2001a%3A0" cites: 0 citedby: 0 booktitle: "Workshop on New Visions for Large-Scale Networks: Research and Applications" kind: "inproceedings" key: "Bush2001a:0" - title: "Active Virtual Network Management Prediction: Complexity as a Framework for Prediction, Optimization, and Assurance" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2002" month: "May" abstract: "Research into active networking has provided the incentive to re-visit what has traditionally been classified as distinct properties and characteristics of information transfer such as protocol versus service; at a more fundamental level this paper considers the blending of computation and communication by means of complexity. The specific service examined in this paper is network self-prediction enabled by Active Virtual Network Management Prediction. Computation/ communication is analyzed via Kolmogorov Complexity. The result is a mechanism to understand and improve the performance of active networking and Active Virtual Network Management Prediction in particular. The Active Virtual Network Management Prediction mechanism allows information, in various states of algorithmic and static form, to be transported in the service of prediction for network management. The results are generally applicable to algorithmic transmission of information. Kolmogorov Complexity is used and experimentally validated as a theory describing the relationship among algorithmic compression, complexity, and prediction accuracy within an active network. Finally, the paper concludes with a complexity-based framework for Information Assurance that attempts to take a holistic view of vulnerability analysis." tags: - "optimization" - "rule-based" - "protocol" - "analysis" - "static analysis" - "Kolmogorov complexity" researchr: "https://researchr.org/publication/Bush2002" cites: 0 citedby: 0 booktitle: "IEEE Computer Society Press, Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002)" kind: "inproceedings" key: "Bush2002" - title: "Kolmogorov Complexity Estimates For Detection Of Viruses In Biologically Inspired Security Systems: A Comparison With Traditional Approaches" author: - name: "Sanjay Goel" link: "https://researchr.org/alias/sanjay-goel" - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2003" month: "Nov" abstract: "This paper presents results in two mutually complementary areas: distributed immunological information assurance and a new signature matching technique based upon Kolmogorov Complexity. This paper introduces a distributed model for security based on biological paradigms of Epidemiology and Immunology. In this model each node in the network has an immune system that identifies and destroys pathogens in the incoming network traffic as well as files resident on the node. The network nodes present a collective defense to the pathogens by working symbiotically and sharing pathogen information with each other. Each node compiles a list of pathogens that are perceived as threats by using information provided from all the nodes in the network. The signatures for these pathogens are incorporated into the detector population of the immune systems to increase the probability of detection. Critical to the success of this system is the detection scheme, which should not only be accurate but also efficient. Three separate schemes for detecting pathogens are examined, namely, Contiguous string matching, Hamming Distance, and Kolmogorov Complexity. This work provides a model of the system and examines the efficiency of different detection schemes. A simulation model is built to study the sensitivity of model parameters, such as signature length, sampling rate, network topology, etc. to detection of pathogens." links: "url": "http://www.research.ge.com/~bushsf/pdfpapers/ImmunoComplexity.pdf" tags: - "rule-based" - "meta-model" - "Kolmogorov complexity" - "security" - "compiler" - "information models" - "Meta-Environment" - "systematic-approach" researchr: "https://researchr.org/publication/Goel2003%3A0" cites: 0 citedby: 0 booktitle: "Invited Paper: SFI Workshop: Resilient and Adaptive Defense of Computing Networks 2003" kind: "inproceedings" key: "Goel2003:0" - title: "Genetically Induced Communication Network Fault Tolerance" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2003" month: "Nov" abstract: "This paper presents the architecture and initial feasibility results of a proto-type communication network that utilizes genetic programming to evolve services and protocols as part of network operation. The network evolves responses to environmental conditions in a manner that could not be pre-programmed within legacy network nodes a priori. A priori in this case means before network operation has begun. Genetic material is exchanged, loaded, and run dynamically within an active network. The transfer and execution of code in support of the evolution of network protocols and services would not be possible without the active network environment. Rapid generation of network service code occurs via a genetic programming paradigm. Complexity and Algorithmic Information Theory play a key role in understanding and guiding code evolution within the network." links: "url": "http://www.research.ge.com/~bushsf" tags: - "meta programming" - "protocol" - "architecture" - "programming paradigms" - "code generation" - "programming" - "genetic programming" - "type theory" - "Meta-Environment" researchr: "https://researchr.org/publication/Bush2003n%3A0" cites: 0 citedby: 0 journal: "Complexity Journal" volume: "9" number: "2" kind: "article" key: "Bush2003n:0" - title: "The Limits of Motion Prediction Support for Ad hoc Wireless Network Performance" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Nathan Smith" link: "https://researchr.org/alias/nathan-smith" year: "2005" researchr: "https://researchr.org/publication/BushS05" cites: 0 citedby: 0 pages: "495-501" booktitle: "icwn" kind: "inproceedings" key: "BushS05" - title: "Genetically induced communication network fault tolerance" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2003" doi: "http://dx.doi.org/10.1002/cplx.20002" links: doi: "http://dx.doi.org/10.1002/cplx.20002" researchr: "https://researchr.org/publication/Bush03" cites: 0 citedby: 0 journal: "complexity" volume: "9" number: "2" pages: "19-33" kind: "article" key: "Bush03" - title: "An active model-based prototype for predictive network management" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Sanjay Goel" link: "https://researchr.org/alias/sanjay-goel" year: "2005" doi: "http://doi.ieeecomputersociety.org/10.1109/JSAC.2005.854108" links: doi: "http://doi.ieeecomputersociety.org/10.1109/JSAC.2005.854108" tags: - "rule-based" researchr: "https://researchr.org/publication/BushG05" cites: 0 citedby: 0 journal: "jsac" volume: "23" number: "10" pages: "2049-2057" kind: "article" key: "BushG05" - title: "Special issue: advances in resource-constrained device networking" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Amit B. Kulkarni" link: "https://researchr.org/alias/amit-b.-kulkarni" year: "2007" doi: "http://dx.doi.org/10.1002/wcm.531" links: doi: "http://dx.doi.org/10.1002/wcm.531" researchr: "https://researchr.org/publication/BushK07" cites: 0 citedby: 0 journal: "wicomm" volume: "7" number: "7" pages: "821-822" kind: "article" key: "BushK07" - title: "Extended Abstract: Complexity and Vulnerability Analysis" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2003" month: "Jun" abstract: "An active network allows packets to contain a mixture of code (algorithm) and data. The ratio of code to data can vary as the packet travels through the network. Such networks can also be vulnerable to attack via the transport of virus or worm code. A mitigation of this problem has been attempted via the use of active network probes to detect vulnerabilities in an active network. A complexity estimate of active protocols being transported within the network by active packets is obtained. In addition components within the active network contain probe points through which bit-level I/O can be collected. Kolmogorov Complexity estimates based upon simple inverse compression ratios have used to estimate vulnerability. The intent has been to experiment with better complexity measures as the research continues. Consider the complexity of bit-level input and output strings concatenated together. That is, observe an input sequence to an arbitrary process (i.e. a potentially vulnerable process) at the bit-level and concatenate with an output sequence at the bit-level. This input/output concatenation can be applied to entire systems or to components of a system. If there is low complexity in the I/O observations, then it is likely to be easy for an attacker to \"understand\" and usurp that component." links: "url": "http://dimacs.rutgers.edu/Workshops/Inference/abstracts.html" tags: - "rule-based" - "protocol" - "points-to analysis" - "analysis" - "Kolmogorov complexity" - "data-flow" - "source-to-source" - "data-flow analysis" - "open-source" researchr: "https://researchr.org/publication/Bush2003i%3A0" cites: 0 citedby: 0 booktitle: "Invited Paper: SFI Workshop: Resilient and Adaptive Defense of Computing Networks 2003" kind: "inproceedings" key: "Bush2003i:0" - title: "Information Warfare Strategy and Control Analysis" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Bruce Barnett" link: "https://researchr.org/alias/bruce-barnett" year: "1999" abstract: "This precis describes a tool for quantifying the vulnerability of a communications network. It is important that information warfare studies include both offensive and defensive strategies in an integrated manner since neither can be studied in isolation. It is assumed that an attacker has a finite amount of resources with which to discover faults in the network security of a data communications network and that each fault discovery consumes the attackersâ?? resources. Network security actions may be taken to increase security in strategic areas of the network and to actively deter an attack. Reactions such as these by network security in response to an attack have a both a monetary cost and a cost in terms of reduction of network resources and degradation of services to network consumers. An optimal course of action by network security in response to an attack is to minimize network access to an attacker while also minimizing the impact to legitimate network consumers. This requires precise assessment of network security vulnerability and quantification of effects on network consumers by actions taken by network security in response to an attack. This white paper proposes incorporating methods and algorithms into an existing proto-type tool that we have developed for using vulnerability information collected from an actual network and simulating the results of an attack so the command and control strategies can be studied." links: "url": "http://www.research.ge.com/~bushsf/pdfpapers/nvaprecis.pdf" tags: - "discovery" - "analysis" - "data-flow" - "security" - "access control" - "data-flow analysis" researchr: "https://researchr.org/publication/Bush%3A0" cites: 0 citedby: 0 kind: "unpublished" key: "Bush:0" - title: "The Design and Analysis of Virtual Network Configuration for a Wireless Mobile ATM Network" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "1997" month: "Aug" abstract: "This research concentrates on the design and analysis of an algorithm referred to as Virtual Network Configuration (VNC) which uses predicted future states of a system for faster network configuration and management. VNC is applied to the configuration of a wireless mobile ATM network. VNC is built on techniques from parallel discrete event simulation merged with constraints from real-time systems and applied to mobile ATM configuration and handoff. Configuration in a mobile network is a dynamic and continuous process. Factors such as load, distance, capacity and topology are all constantly changing in a mobile environment. The VNC algorithm anticipates configuration changes and speeds the reconfiguration process by pre-computing and caching results. VNC propagates local prediction results throughout the VNC enhanced system. The Global Positioning System is an enabling technology for the use of VNC in mobile networks because it provides location information and accurate time for each node. This research has resulted in well defined structures for the encapsulation of physical processes within Logical Processes and a generic library for enhancing a system with VNC. Enhancing an existing system with VNC is straight forward assuming the existing physical processes do not have side effects. The benefit of prediction is gained at the cost of additional traffic and processing. This research includes an analysis of VNC and suggestions for optimization of the VNC algorithm and its parameters." links: "url": "http://www.ittc.ukans.edu/RDRN/documents/" tags: - "optimization" - "caching" - "design research" - "analysis" - "constraints" - "Meta-Environment" - "design" - "mobile" researchr: "https://researchr.org/publication/Bush1997b%3A0" cites: 0 citedby: 0 school: "University of Kansas" kind: "phdthesis" key: "Bush1997b:0" - title: "A Simple Metric for Ad Hoc Network Adaptation" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2005" month: "Dec" abstract: "This paper examines flexibility in ad hoc networks and suggests that, even with cross-layer design as a mechanism to improve adaptation, a fundamental limitation exists in the ability of a single optimization function, defined a priori, to adapt the network to meet all quality-of-service requirements. Thus, code implementing multiple algorithms will have to be positioned within the network. Active networking and programmable networking enable unprecedented autonomy and flexibility for ad hoc communication networks. However, in order to best leverage the results of active and programmable networking, metrics that indicate the nature and location of required flexibility need to be developed. The primary contribution of this paper is to propose a metric that couples network topological rate of change with the ability of a generic service to move itself to an optimal location in concert with the changing network. This metric points to a fundamental tradeoff among adaptation (changing service location), performance (sophistication or estimated minimum code size of the service), and the networkâ??s ability to tune itself to a changing ad hoc network topology." links: "url": "http://www.research.ge.com/~bushsf" tags: - "optimization" - "generic programming" - "program optimization" - "design" researchr: "https://researchr.org/publication/Bush2005g%3A0" cites: 0 citedby: 0 journal: "IEEE Journal on Selected Areas in Communications Journal" volume: "23" number: "12" kind: "article" key: "Bush2005g:0" - title: "A Quantitative Approach to Measuring Assurance with Uncertainty in Data Provenance" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Abha Moitra" link: "https://researchr.org/alias/abha-moitra" - name: "Andrew Crapo" link: "https://researchr.org/alias/andrew-crapo" - name: "Bruce Barnett" link: "https://researchr.org/alias/bruce-barnett" - name: "Stephen J. Dill" link: "https://researchr.org/alias/stephen-j.-dill" year: "2009" abstract: "A data provenance framework is subject to security threats and risks, which increase the uncertainty, or lack of trust, in provenance information. Information assurance is challenged by incomplete information; one cannot exhaustively characterize all threats or all vulnerabilities. One technique that specifically incorporates a probabilistic notion of uncertainty is subjective logic. Subjective logic allows belief and uncertainty, due to incomplete information, to be specified and operated upon in a coherent manner. A mapping from the standard definition of information assurance to a more quantitative subjective logic framework is suggested with a focus on the specific application of data provenance. Finally, specific consideration is given to the notion of uncertainty within subjective logic and its relation to information entropy. Information entropy is an alternative measure of uncertainty and a fundamental relationship is hypothesized between uncertainty in subjective logic and entropy." tags: - "application framework" - "data-flow" - "security" - "logic" - "systematic-approach" researchr: "https://researchr.org/publication/Bush2009d%3A0" cites: 0 citedby: 0 kind: "unpublished" key: "Bush2009d:0" - title: "Detecting Distributed Denial-of-Service Attacks using Kolmogorov Complexity Metrics" author: - name: "Amit B. Kulkarni" link: "https://researchr.org/alias/amit-b.-kulkarni" - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Scott C. Evans" link: "https://researchr.org/alias/scott-c.-evans" year: "2001" month: "Dec" abstract: "This paper describes an approach to detecting distributed denial of service (DDoS) attacks that is based on fundamentals of information theory, specifically Kolmogorov complexity. The algorithm is based on a concept of Kolmogorov complexity that states that the joint complexity measure of random strings is lower than the sum of the complexities of the individual strings if the strings exhibit some correlation. Furthermore, the joint complexity measure varies inversely with the amount of correlation. The proposed algorithm exploits this feature to correlate traffic flows in the network and detect possible denial-of-service attacks. One of the strengths of this algorithm is that it does not require special filtering rules and hence it can be used to detect any type of DDoS attack. This algorithm is shown to perform better than simple packet-counting or load-measuring approaches." links: "url": "http://www.research.ge.com/~bushsf/ftn/2001crd176.pdf" tags: - "rule-based" - "Kolmogorov complexity" - "data-flow" - "rules" - "C++" - "type theory" - "systematic-approach" researchr: "https://researchr.org/publication/Kulkarni2001a%3A0" cites: 0 citedby: 0 institution: "GE Global Research Center" number: "2001CRD176" kind: "techreport" key: "Kulkarni2001a:0" - title: "Sync and Swarm Behavior for Sensor Networks" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2005" month: "Jun" abstract: "A key component in efficient and intelligent sensor networking is inducing collaborative behavior. We examine collaboration from the point of view of synchronizing activity. Power consumption and pulse-coupled oscillation are explored in terms of low power time synchronization. More complex synchronous patterns are examined via Boolean Network state trajectories. Boolean Networks have the characteristic of simple components, namely Boolean functions, with localized sets of inter-connections. The result, even with a random density of interconnections, can be a stable self-regulating system whose state settles into organized patterns. Such systems can be analyzed for their basins of attraction, attractor state cycles, and stability. In fact, known systems can be reverse engineered as a Boolean Network. Boolean networks can also be constructed to solve arbitrary computational problems, such as K-SAT. The self-regulating group behavior exhibited by Boolean Networks and their localized interactions makes them an enticing model for studying self-organization and self-configuration in complex systems." links: "url": "http://www.research.ge.com/~bushsf" tags: - "power consumption" - "synchronization" - "meta-model" - "Meta-Environment" researchr: "https://researchr.org/publication/Bush2005d%3A0" cites: 0 citedby: 0 booktitle: "Joint IEEE Communications Society and Aerospace Chapter Presentation" kind: "inproceedings" key: "Bush2005d:0" - title: "A Security Vulnerability Assessment Technique and Model" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Bruce Barnett" link: "https://researchr.org/alias/bruce-barnett" year: "1998" month: "Jan" abstract: "This paper presents a framework and a tool for quantifying the security of a communication network. The framework is compared to some aspects of the human immune system providing insights into methods of quantifying vulnerabilities, detecting an intruder, and fighting an attack. It is assumed that an attacker has a finite amount of resources with which to discover faults in the network security of a data communications network and that each fault discovery consumes the attackers' resources. Extensions of this method in light of knowledge of the operation of the human immune system are explored. Network security actions may be taken to increase security in strategic areas of the network and to actively pursue an attacker. Reactions such as these by network security in response to an attack have a cost in terms of network resources and degradation of services to network consumers. An optimal course of action by network security in response to an attack is to minimize network access to an attacker while also minimizing the impact to legitimate network consumers. The optimal course of action by network security personnel requires precise assessment of network security vulnerability, quantification of effects on network consumers by actions taken by network security in response to an attack, and a framework for applying the vulnerability assessment." links: "url": "http://www.research.ge.com/~bushsf" tags: - "discovery" - "data-flow" - "security" researchr: "https://researchr.org/publication/Bush1998" cites: 0 citedby: 0 institution: "General Electric Corporate Research and Development Center" number: "98CRD028" kind: "techreport" key: "Bush1998" - title: "Thought Communication" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Amit B. Kulkarni" link: "https://researchr.org/alias/amit-b.-kulkarni" year: "2001" month: "Mar" links: "url": "http://www.hpcc.gov/iwg/lsn/lsn-workshop-12mar01/" researchr: "https://researchr.org/publication/Bush2001a" cites: 0 citedby: 0 booktitle: "Workshop on New Visions for Large-Scale Networks: Research and Applications" kind: "inproceedings" key: "Bush2001a" - title: "Active Jitter Control" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Amit Kulkarni" link: "https://researchr.org/alias/amit-kulkarni" - name: "Scott Evans" link: "https://researchr.org/alias/scott-evans" - name: "Luiz Galup" link: "https://researchr.org/alias/luiz-galup" year: "2000" month: "Feb" abstract: "This study is the first known implementation of jitter control in an active network. Jitter control is performed by active packets in a distributed packet by packet basis within an active network rather than on a per flow basis as in today's passive networks. This provides many new benefits and challenges. The concept and results of an experimental validation of this method are presented." links: "url": "http://www.research.ge.com/~bushsf" tags: - "data validation" - "data-flow" researchr: "https://researchr.org/publication/Bush2000" cites: 0 citedby: 0 booktitle: "7th International IS\\&N Conference, Intelligence in Services and Networks (ISN) '00, Kavouri, Athens, Greece" kind: "inproceedings" key: "Bush2000" - title: "Active Virtual Network Management Prediction" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "1999" month: "May" abstract: "This paper introduces a novel algorithm, the Active Virtual Network Management Prediction (AVNMP), for predictive network management. It explains how the AVNMP facilitates the management of an active network by allowing future predicted state information within an active network to be available to network management algorithms. This is accomplished by coupling ideas from optimistic discrete event simulation with active networking. The optimistic discrete event simulation method used is a form of self-adjusting Time Warp. It is self-adjusting because the system adjusts for predictions which are inaccurate beyond a given tolerance. The concept of a streptichron and autoanaplasis are introduced as mechanisms which take advantage of the enhanced flexibility and intelligence of active packets. Finally, it is demonstrated that the AVNMP is a feasible concept." links: "url": "http://www.research.ge.com/~bushsf" researchr: "https://researchr.org/publication/Bush1999b%3A0" cites: 0 citedby: 0 booktitle: "PADS '99" kind: "inproceedings" key: "Bush1999b:0" - title: "Wireless ad hoc nanoscale networking - industry perspectives" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2009" doi: "10.1109/MWC.2009.5300295" abstract: "Wireless ad hoc communication on the nanoscale will require thinking outside of the traditional radio spectrum. New applications will utilize new forms of wireless communication channels. For example, nanoscale communication will enable precise mechanisms for directly interacting with cells in vivo. Information may be sent to and from specific cells within the body, allowing detection and healing of diseases on the cellular scale. From a medical standpoint, the use of current wireless techniques to communicate with implants is unacceptable for many reasons, including bulky size, inability to use magnetic resonance imaging after implantation, potential radiation damage, surgical invasiveness, need to recharge/replace power, post-operative pain and long recovery times, and reduced quality of life for the patient. Better, more humane in vivo implant communication is needed. Development of both biological and engineered nanomachines is progressing; such machines will need to communicate [1]. Unfortunately, networking vast collections of nanoscale sensors and robots using current techniques, including wireless techniques, is not possible without communication mechanisms that exceed nanoscale volumes." tags: - "wireless sensor networks" researchr: "https://researchr.org/publication/Bush2009f%3A0" cites: 0 citedby: 0 journal: "IEEE_M_WC" volume: "16" number: "5" kind: "article" key: "Bush2009f:0" - title: "On The Effectiveness of Kolmogorov Complexity Estimation to Discriminate Semantic Types" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Todd Hughes" link: "https://researchr.org/alias/todd-hughes" year: "2003" month: "Nov" abstract: "We present progress on the experimental validation of a fundamental and universally applicable vulnerability analysis framework that is capable of identifying new types of vulnerabilities before attackers innovate attacks. This new framework proactively identifies system components that are vulnerable based upon their Kolmogorov Complexity estimates and it facilitates prediction of previously unknown vulnerabilities that are likely to be exploited by future attack methods. A tool that utilizes a growing library of complexity estimators is presented. This work is an incremental step towards validation of the concept of complexity-based vulnerability analysis. In particular, results indicate that data types (semantic types) can be identified by estimates of their complexity. Thus, a map of complexity can identify suspicious types, such as executable data embedded within passive data types, without resorting to predefined headers, signatures, or other limiting a priori information" links: "url": "http://www.research.ge.com/~bushsf" tags: - "data validation" - "rule-based" - "analysis" - "type system" - "Kolmogorov complexity" - "data-flow" - "data-flow analysis" - "incremental" researchr: "https://researchr.org/publication/Bush2003a" cites: 0 citedby: 0 booktitle: "Proceedings of the SFI Workshop on Resilient and Adaptive Defense of Computing Networks 2003" kind: "inproceedings" key: "Bush2003a" - title: "On Respecting Interdependence Between Queuing Policy and Message Value" author: - name: "John Hershey" link: "https://researchr.org/alias/john-hershey" - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "1999" month: "Dec" abstract: "Dynamic reprioritization of a message based on simple heuristics and the knowledge of already sent messages, messages in queue, and, perhaps, messages expected should be a element of consideration for intelligent networks supporting those endeavors that may well expect stressed and degraded communications capacity. Additionally, the use of simple computational heuristics may serve well in effecting admittedly suboptimal but highly efficacious queuing policies. The discipline of active networks is suggested as an appropriate superfield for cabining these activities." links: "url": "http://www.research.ge.com/~bushsf" tags: - "rule-based" researchr: "https://researchr.org/publication/Hershey1999%3A0" cites: 0 citedby: 0 institution: "General Electric Research and Development" number: "99CRD151" kind: "techreport" key: "Hershey1999:0" - title: "Predicting and Controlling Resource Usage in a Heterogeneous Active Network" author: - name: "Virginie Galtier" link: "https://researchr.org/alias/virginie-galtier" - name: "Kevin L. Mills" link: "https://researchr.org/alias/kevin-l.-mills" - name: "Yannick Carlinet" link: "https://researchr.org/alias/yannick-carlinet" - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Amit B. Kulkarni" link: "https://researchr.org/alias/amit-b.-kulkarni" year: "2001" doi: "http://csdl.computer.org/comp/proceedings/ams/2001/1528/00/15280035abs.htm" links: doi: "http://csdl.computer.org/comp/proceedings/ams/2001/1528/00/15280035abs.htm" researchr: "https://researchr.org/publication/GaltierMCBK01" cites: 0 citedby: 0 pages: "35-44" booktitle: "ieeeams" kind: "inproceedings" key: "GaltierMCBK01" - title: "Biological Models of Security for Virus Propagation in Computer Networks" author: - name: "Sanjay Goel" link: "https://researchr.org/alias/sanjay-goel" - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2004" month: "Dec" abstract: "This aricle discusses the similarity between the propagation of pathogens (viruses and worms) on computer networks and the proliferation of pathogens in cellular organisms (organisms with genetic material contained within a membrane-encased nucleus). It introduces several biological mechanisms which are used in these organisms to protect against such pathogens and presents security models for networked computers inspired by several biological paradigms, including genomics (RNA interference), proteomics (pathway mapping), and physiology (immune system). In addition, the study of epidemiological models for disease control can inspire methods for controlling the spread of pathogens across multiple nodes of a network. It also presents results based on the authorsâ?? research in immune system modeling." links: "url": "http://www.research.ge.com/~bushsf" tags: - "control systems" - "rule-based" - "meta-model" - "modeling" - "security" - "Meta-Environment" researchr: "https://researchr.org/publication/Goel2004a%3A0" cites: 0 citedby: 0 journal: ";Login;" volume: "29" number: "6" kind: "article" key: "Goel2004a:0" - title: "Islands of Near-Perfect Self-Prediction" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2000" month: "Jan" abstract: "In the course of efforts to more fully utilize the power of active networks to build a self-managing communications network, the nature of entanglement and the relationship between modeling and communication become of utmost importance. This paper provides a very brief introduction to Active Networks and the Active Virtual Network Management Prediction Project whose goal is a self-managing communications network. The focus of the paper is upon the effects of near-infinite resources; that is, how will such a self-predictive system behave as processing and bandwidth become ever larger and more powerful. An attempt is made to identify new theories required to understand such highly self-predictive systems." links: "url": "http://www.research.ge.com/~bushsf/an/vwsim00.pdf" tags: - "meta-model" - "modeling" - "Meta-Environment" - "process modeling" researchr: "https://researchr.org/publication/Bush2000a%3A0" cites: 0 citedby: 0 booktitle: "Proceedings of VWsim'00: Virtual Worlds and Simulation Conference, WMC'00: 2000 SCS Western Multi-Conference, San Diego, SCS (2000)" kind: "inproceedings" key: "Bush2000a:0" - title: "Complexity-Based Information Assurance" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "S. C. Evans" link: "https://researchr.org/alias/s.-c.-evans" year: "2001" month: "Oct" abstract: "Unless vulnerabilities can be identified and measured, the information assurance of a system can never be properly designed or guaranteed. Results from a study on complexity evolving within an information system using Mathematica, Swarm, and a new Java complexity probe toolkit are presented in this paper. An underlying definition of information security is hypothesized based upon the attacker and defender as reasoning entities, capable of learning to outwit one another. This leads to a study of the evolution of complexity in an information system and the effects of the environment upon the evolution of information complexity. Understanding the evolution of complexity in a system enables a better understanding of how to measure and quantify the vulnerability of a system. Finally, the design of the Java complexity probe toolkit under construction for automated measurement of information assurance is presented." tags: - "rule-based" - "Java" - "design complexity" - "C++" - "security" - "Meta-Environment" - "design" researchr: "https://researchr.org/publication/Bush2001d%3A0" cites: 0 citedby: 0 institution: "GE Global Research Center" number: "2001CRD084" kind: "techreport" key: "Bush2001d:0" - title: "Network Characteristics of Carbon Nanotubes: A Graph Eigenspectrum Approach and Tool Using Mathematica" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Yun Li" link: "https://researchr.org/alias/yun-li" year: "2006" abstract: "This paper reports advances in analyzing the network structure of carbon nanotube (CNT) networks. CNT devices continue to receive attention for a variety of applications. Unfortunately, understanding the characteristics of random networks formed by such tubes has stymied progress. With respect to transistors constructed from CNT networks, electron and hole mobility provide a measure of the rate of current flow as a gate voltage is applied. The higher the mobility, the faster the gate can switch; this leads to faster computation and faster processors, e.g. faster routers, wireless links, computers, etc. Mobility is relatively easy to predict for a single carbon nanotube. Unfortunately, mobility becomes extremely complex for networks of tubes. The performance of pure carbon nanotube networks and networks with impurities has been complicated by their random network structures. A model to predict CNT network device performance based on randomized tube layout and metallic tube characteristics has been needed in order to explore CNT network performance. This report develops a mathematical network model, implemented in Mathematica, based upon the eigenspectrum of the graph laplacian of the network. This technique allows the impact of individual tube characteristics on the entire network structure to be analyzed in detail rather than requiring aggregate and often-inaccurate estimates. The analytically derived values using the eigenspectrum approach are shown to match trends obtained from experimental measurements. Future technical reports will use this model to provide guidance in identifying methods to improve performance based upon such characteristics as distributions of tube angles and tube lengths. Mathematica commands are included in this report to demonstrate the operation of the software tool implementing the analysis as well as the theory behind its operation." links: "url": "http://www.research.ge.com/~bushsf/pdfpapers/2006GRC023_Final_ver.pdf" tags: - "rule-based" - "layout" - "meta-model" - "analysis" - "data-flow" - "graph-rewriting" - "Meta-Environment" - "rewriting" - "data-flow analysis" - "routing" - "process modeling" - "systematic-approach" researchr: "https://researchr.org/publication/Bush2006b" cites: 0 citedby: 0 institution: "GE Global Research" number: "2006GRC023" kind: "techreport" key: "Bush2006b" - title: "Network Management of Predictive Mobile Networks" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Victor S. Frost" link: "https://researchr.org/alias/victor-s.-frost" - name: "Joseph B. Evans" link: "https://researchr.org/alias/joseph-b.-evans" year: "1999" month: "Jun" abstract: "There is a trend toward the use of predictive systems in communications networks. At the systems and network management level predictive capabilities are focused on anticipating network faults and performance degradation. Simultaneously, mobile communication networks are being developed with predictive location and tracking mechanisms. The interactions and synergies between these systems present a new set of problems. A new predictive network management framework is developed and examined. The interaction between a predictive mobile network and the proposed network management system is discussed. The Rapidly Deployable Radio Network is used as a specific example to illustrate these interactions." links: "url": "http://www.crd.ge.com/people/bush" tags: - "deployment" - "mobile" researchr: "https://researchr.org/publication/Bush1999a" cites: 0 citedby: 0 journal: "Journal of Network and Systems Management" volume: "7" number: "2" kind: "article" key: "Bush1999a" - title: "Genetically Induced Communication Network Fault Tolerance" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2003" doi: "http://dx.doi.org/10.1002/cplx.20002" abstract: "This paper presents the architecture and initial feasibility results of a proto-type communication network that utilizes genetic programming to evolve services and protocols as part of network operation. The network evolves responses to environmental conditions in a manner that could not be preprogrammed within legacy network nodes a priori. A priori in this case means before network operation has begun. Genetic material is exchanged, loaded, and run dynamically within an active network. The transfer and execution of code in support of the evolution of network protocols and services would not be possible without the active network environment. Rapid generation of network service code occurs via a genetic programming paradigm. Complexity and Algorithmic Information Theory play a key role in understanding and guiding code evolution within the network." links: doi: "http://dx.doi.org/10.1002/cplx.20002" "url": "http://www.research.ge.com/~bushsf/pdfpapers/ComplexityJournal.pdf" tags: - "meta programming" - "protocol" - "architecture" - "programming paradigms" - "code generation" - "programming" - "genetic programming" - "type theory" - "Meta-Environment" researchr: "https://researchr.org/publication/Bush2004" cites: 0 citedby: 0 journal: "Complexity Special Issue: \"Resilient \\& Adaptive Defense of Computing Networks\"" volume: "9" number: "2" kind: "article" key: "Bush2004" - title: "Applying compartmentalisation techniques to communication protocols of biological Nano and MEMS devices" author: - name: "Sasitharan Balasubramaniam" link: "https://researchr.org/alias/sasitharan-balasubramaniam" - name: "Dmitri Botvich" link: "https://researchr.org/alias/dmitri-botvich" - name: "Frank Walsh" link: "https://researchr.org/alias/frank-walsh" - name: "William Donnelly" link: "https://researchr.org/alias/william-donnelly" - name: "Sergey Sergeyev" link: "https://researchr.org/alias/sergey-sergeyev" - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2007" doi: "http://dx.doi.org/10.1109/BROADNETS.2007.4550450" links: doi: "http://dx.doi.org/10.1109/BROADNETS.2007.4550450" tags: - "protocol" researchr: "https://researchr.org/publication/BalasubramaniamBWDSB07" cites: 0 citedby: 0 pages: "323-325" booktitle: "broadnets" kind: "inproceedings" key: "BalasubramaniamBWDSB07" - title: "Active Network Management, Kolmogorov Complexity, and Streptichrons" author: - name: "Amit B. Kulkarni" link: "https://researchr.org/alias/amit-b.-kulkarni" - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2000" month: "dec" abstract: "This report discusses the goals and requirements that drive the architecture for an active network. The active network management framework refers to the minimum model that describes components and interactions necessary to support management via an active network. An overview of the management architecture for today's passive networks is discussed as a prelude to the presenting a new active network management model. Finally, the new active network management model is developed a step further into the initial exploration of emergent behavior within an active network." links: "url": "http://www.research.ge.com/~bushsf" tags: - "meta-model" - "modeling" - "architecture" - "network" - "Kolmogorov complexity" - "Meta-Environment" researchr: "https://researchr.org/publication/Kulkarni2000%3A0" cites: 0 citedby: 0 institution: "General Electric Corporate Research and Development" number: "2000CRD107" kind: "techreport" key: "Kulkarni2000:0" - title: "Kolmogorov Complexity Estimates For Detection Of Viruses In Biologically Inspired Security Systems: A Comparison With Traditional Approaches" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Sanjay Goel" link: "https://researchr.org/alias/sanjay-goel" year: "2003" month: "Nov" abstract: "This paper presents results in two mutually complementary areas: distributed immunological information assurance and a new signature matching technique based upon Kolmogorov Complexity. This paper introduces a distributed model for security based on biological paradigms of Epidemiology and Immunology. In this model each node in the network has an immune system that identifies and destroys pathogens in the incoming network traffic as well as files resident on the node. The network nodes present a collective defense to the pathogens by working symbiotically and sharing pathogen information with each other. Each node compiles a list of pathogens that are perceived as threats by using information provided from all the nodes in the network. The signatures for these pathogens are incorporated into the detector population of the immune systems to increase the probability of detection. Critical to the success of this system is the detection scheme, which should not only be accurate but also efficient. Three separate schemes for detecting pathogens are examined, namely, Contiguous string matching, Hamming Distance, and Kolmogorov Complexity. This work provides a model of the system and examines the efficiency of different detection schemes. A simulation model is built to study the sensitivity of model parameters, such as signature length, sampling rate, network topology, etc. to detection of pathogens." links: "url": "http://www.research.ge.com/~bushsf" tags: - "rule-based" - "meta-model" - "Kolmogorov complexity" - "security" - "compiler" - "information models" - "Meta-Environment" - "systematic-approach" researchr: "https://researchr.org/publication/Bush2003o" cites: 0 citedby: 0 journal: "Complexity Journal" volume: "9" number: "2" kind: "article" key: "Bush2003o" - title: "Active Network Management and Kolmogorov Complexity" author: - name: "Amit B. Kulkarni" link: "https://researchr.org/alias/amit-b.-kulkarni" - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2001" month: "Apr" abstract: "This paper seeks to describe new and better ways to represent network health and thus attempts to explore concepts other than those based on network topology-based representations of network management. It examines the manner in which active network management can benefit from Algorithmic Information Theory. Due to the new paradigm and enhanced capabilities of active networks, this work proceeds along the lines that a new perspective that incorporates Algorithmic Information Theory can provide superior, innovative solutions for network management." links: "url": "http://www.research.ge.com/~bushsf" tags: - "rule-based" - "Kolmogorov complexity" researchr: "https://researchr.org/publication/Kulkarni2001b" cites: 0 citedby: 0 booktitle: "Proceedings of IEEE OpenArch 2001" kind: "inproceedings" key: "Kulkarni2001b" - title: "The Limits of Motion Prediction Support for Ad hoc Wireless Network Performance" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Nathan Smith" link: "https://researchr.org/alias/nathan-smith" year: "2005" month: "Jun" abstract: "A fundamental understanding of gain provided by motion prediction in wireless ad hoc routing is currently lacking. This paper examines benefits in routing obtainable via prediction. A theoretical best-case non-predictive routing model is quantified in terms of both message overhead and update time for non-predictive routing. This best- case model of existing routing performance is compared with predictive routing. Several specific instances of predictive improvements in routing are examined. The primary contribution of this paper is quantification of predictive gain for wireless ad hoc routing." links: "url": "http://www.research.ge.com/~bushsf" tags: - "wireless" - "meta-model" - "Meta-Environment" - "routing" researchr: "https://researchr.org/publication/Bush2005a%3A0" cites: 0 citedby: 0 booktitle: "Proceedings of the 2005 International Conference on Wireless Networks (ICWN-05)" kind: "inproceedings" key: "Bush2005a:0" - title: "Extended Abstract: Complexity and Vulnerability Analysis" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2003" month: "Jun" abstract: "An active network allows packets to contain a mixture of code (algorithm) and data. The ratio of code to data can vary as the packet travels through the network. Such networks can also be vulnerable to attack via the transport of virus or worm code. A mitigation of this problem has been attempted via the use of active network probes to detect vulnerabilities in an active network. A complexity estimate of active protocols being transported within the network by active packets is obtained. In addition components within the active network contain probe points through which bit-level I/O can be collected. Kolmogorov Complexity estimates based upon simple inverse compression ratios have used to estimate vulnerability. The intent has been to experiment with better complexity measures as the research continues. Consider the complexity of bit-level input and output strings concatenated together. That is, observe an input sequence to an arbitrary process (i.e. a potentially vulnerable process) at the bit-level and concatenate with an output sequence at the bit-level. This input/output concatenation can be applied to entire systems or to components of a system. If there is low complexity in the I/O observations, then it is likely to be easy for an attacker to \"understand\" and usurp that component." links: "url": "http://www.research.ge.com/~bushsf" tags: - "rule-based" - "protocol" - "points-to analysis" - "analysis" - "Kolmogorov complexity" - "data-flow" - "source-to-source" - "data-flow analysis" - "open-source" researchr: "https://researchr.org/publication/Bush2003h%3A0" cites: 0 citedby: 0 booktitle: "Complexity and Inference" kind: "inproceedings" key: "Bush2003h:0" - title: "The Design and Analysis of Virtual Network Configuration for a Wireless Mobile ATM Network" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "1997" month: "Aug" abstract: "This research concentrates on the design and analysis of an algorithm referred to as Virtual Network Configuration (VNC) which uses predicted future states of a system for faster network configuration and management. VNC is applied to the configuration of a wireless mobile ATM network. VNC is built on techniques from parallel discrete event simulation merged with constraints from real-time systems and applied to mobile ATM configuration and handoff. Configuration in a mobile network is a dynamic and continuous process. Factors such as load, distance, capacity and topology are all constantly changing in a mobile environment. The VNC algorithm anticipates configuration changes and speeds the reconfiguration process by pre-computing and caching results. VNC propagates local prediction results throughout the VNC enhanced system. The Global Positioning System is an enabling technology for the use of VNC in mobile networks because it provides location information and accurate time for each node. This research has resulted in well defined structures for the encapsulation of physical processes within Logical Processes and a generic library for enhancing a system with VNC. Enhancing an existing system with VNC is straight forward assuming the existing physical processes do not have side effects. The benefit of prediction is gained at the cost of additional traffic and processing. This research includes an analysis of VNC and suggestions for optimization of the VNC algorithm and its parameters." links: "url": "http://www.ittc.ukans.edu/RDRN/documents/" tags: - "optimization" - "caching" - "design research" - "analysis" - "constraints" - "Meta-Environment" - "design" - "mobile" researchr: "https://researchr.org/publication/Bush1997b" cites: 0 citedby: 0 school: "University of Kansas" kind: "phdthesis" key: "Bush1997b" - title: "An Active Model-Based Prototype for Predictive Network Management" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Sanjay Goel" link: "https://researchr.org/alias/sanjay-goel" year: "2005" month: "Nov" abstract: "If current trends continue, the next generation of enterprise networks is likely to become a more complex mixture of hardware, communication media, architectures, protocols, and standards. One approach toward reducing the management burden caused by growing complexity is to integrate management support into the inherent function of network operation. In this paper, management support is provided in the form of network components that, simultaneously with their network function, collaboratively project and adjust projections of future state based upon actual network state. It is well known that more accurate predictions over a longer time horizon enables better control decisions. This paper focuses upon improving prediction; the many potential uses of predictive capabilities for predictive network control will be addressed in future work." links: "url": "http://www.research.ge.com/~bushsf" tags: - "rule-based" - "protocol" - "architecture" - "systematic-approach" researchr: "https://researchr.org/publication/Bush2005m" cites: 0 citedby: 0 journal: "IEEE Journal on Selected Areas in Communications Journal" volume: "23" number: "10" kind: "article" key: "Bush2005m" - title: "A Quantitative Approach to Measuring Assurance with Uncertainty in Data Provenance" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Abha Moitra" link: "https://researchr.org/alias/abha-moitra" - name: "Andrew Crapo" link: "https://researchr.org/alias/andrew-crapo" - name: "Bruce Barnett" link: "https://researchr.org/alias/bruce-barnett" - name: "Stephen J. Dill" link: "https://researchr.org/alias/stephen-j.-dill" year: "2009" abstract: "A data provenance framework is subject to security threats and risks, which increase the uncertainty, or lack of trust, in provenance information. Information assurance is challenged by incomplete information; one cannot exhaustively characterize all threats or all vulnerabilities. One technique that specifically incorporates a probabilistic notion of uncertainty is subjective logic. Subjective logic allows belief and uncertainty, due to incomplete information, to be specified and operated upon in a coherent manner. A mapping from the standard definition of information assurance to a more quantitative subjective logic framework is suggested with a focus on the specific application of data provenance. Finally, specific consideration is given to the notion of uncertainty within subjective logic and its relation to information entropy. Information entropy is an alternative measure of uncertainty and a fundamental relationship is hypothesized between uncertainty in subjective logic and entropy." tags: - "application framework" - "data-flow" - "security" - "logic" - "systematic-approach" researchr: "https://researchr.org/publication/Bush2009d" cites: 0 citedby: 0 kind: "unpublished" key: "Bush2009d" - title: "A Control and Management Network for Wireless ATM Systems" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Sunil Jagannath" link: "https://researchr.org/alias/sunil-jagannath" - name: "Joseph B. Evans" link: "https://researchr.org/alias/joseph-b.-evans" - name: "Victor Frost" link: "https://researchr.org/alias/victor-frost" - name: "Gary Minden" link: "https://researchr.org/alias/gary-minden" - name: "K. Sam Shanmugan" link: "https://researchr.org/alias/k.-sam-shanmugan" year: "1997" abstract: "This paper describes the design of a control and management network (orderwire) for a mobile wireless Asynchronous Transfer Mode (ATM) network. This mobile wireless ATM network is part of the Rapidly Deployable Radio Network (RDRN). The orderwire system consists of a packet radio network which overlays the mobile wireless ATM network, each network element in this network uses Global Positioning System (GPS) information to control a beamforming antenna subsystem which provides for spatial reuse. This paper also proposes a novel Virtual Network Configuration (VNC) algorithm for predictive network configuration. A mobile ATM Private Network-Network Interface (PNNI) based on VNC is also discussed. Finally, as a prelude to the system implementation, results of a Maisie simulation of the orderwire system are discussed." links: "url": "http://www.research.ge.com/~bushsf" tags: - "control systems" - "rule-based" - "deployment" - "network" - "reuse" - "design" - "mobile" researchr: "https://researchr.org/publication/Bush1997a%3A0" cites: 0 citedby: 0 journal: "ACM-Baltzer Wireless Networks (WINET)" volume: "3" kind: "article" key: "Bush1997a:0" - title: "Kolmogorov Complexity for Information Assurance" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Scott C. Evans" link: "https://researchr.org/alias/scott-c.-evans" year: "2001" links: "url": "http://www.research.ge.com/~bushsf" tags: - "Kolmogorov complexity" - "C++" researchr: "https://researchr.org/publication/Bush2001b" cites: 0 citedby: 0 institution: "General Electric Corporate Research and Development" number: "2001CRD148" kind: "techreport" key: "Bush2001b" - title: "Islands of Near-Perfect Self-Prediction" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2000" month: "Jan" abstract: "In the course of efforts to more fully utilize the power of active networks to build a self-managing communications network, the nature of entanglement and the relationship between modeling and communication become of utmost importance. This paper provides a very brief introduction to Active Networks and the Active Virtual Network Management Prediction Project whose goal is a self-managing communications network. The focus of the paper is upon the effects of near-infinite resources; that is, how will such a self-predictive system behave as processing and bandwidth become ever larger and more powerful. An attempt is made to identify new theories required to understand such highly self-predictive systems." links: "url": "http://www.research.ge.com/~bushsf/an/vwsim00.pdf" tags: - "meta-model" - "modeling" - "Meta-Environment" - "process modeling" researchr: "https://researchr.org/publication/Bush2000a" cites: 0 citedby: 0 booktitle: "Proceedings of VWsim'00: Virtual Worlds and Simulation Conference, WMC'00: 2000 SCS Western Multi-Conference, San Diego, SCS (2000)" kind: "inproceedings" key: "Bush2000a" - title: "Active Virtual Network Management Prediction: Complexity as a Framework for Prediction, Optimization, and Assurance" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2002" month: "May" abstract: "Research into active networking has provided the incentive to re-visit what has traditionally been classified as distinct properties and characteristics of information transfer such as protocol versus service; at a more fundamental level this paper considers the blending of computation and communication by means of complexity. The specific service examined in this paper is network self-prediction enabled by Active Virtual Network Management Prediction. Computation/ communication is analyzed via Kolmogorov Complexity. The result is a mechanism to understand and improve the performance of active networking and Active Virtual Network Management Prediction in particular. The Active Virtual Network Management Prediction mechanism allows information, in various states of algorithmic and static form, to be transported in the service of prediction for network management. The results are generally applicable to algorithmic transmission of information. Kolmogorov Complexity is used and experimentally validated as a theory describing the relationship among algorithmic compression, complexity, and prediction accuracy within an active network. Finally, the paper concludes with a complexity-based framework for Information Assurance that attempts to take a holistic view of vulnerability analysis." tags: - "optimization" - "rule-based" - "protocol" - "analysis" - "static analysis" - "Kolmogorov complexity" researchr: "https://researchr.org/publication/Bush2002%3A0" cites: 0 citedby: 0 booktitle: "IEEE Computer Society Press, Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002)" kind: "inproceedings" key: "Bush2002:0" - title: "Complexity-Based Information Assurance" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "S. C. Evans" link: "https://researchr.org/alias/s.-c.-evans" year: "2001" month: "Oct" abstract: "Unless vulnerabilities can be identified and measured, the information assurance of a system can never be properly designed or guaranteed. Results from a study on complexity evolving within an information system using Mathematica, Swarm, and a new Java complexity probe toolkit are presented in this paper. An underlying definition of information security is hypothesized based upon the attacker and defender as reasoning entities, capable of learning to outwit one another. This leads to a study of the evolution of complexity in an information system and the effects of the environment upon the evolution of information complexity. Understanding the evolution of complexity in a system enables a better understanding of how to measure and quantify the vulnerability of a system. Finally, the design of the Java complexity probe toolkit under construction for automated measurement of information assurance is presented." tags: - "rule-based" - "Java" - "design complexity" - "C++" - "security" - "Meta-Environment" - "design" researchr: "https://researchr.org/publication/Bush2001d" cites: 0 citedby: 0 institution: "GE Global Research Center" number: "2001CRD084" kind: "techreport" key: "Bush2001d" - title: "Active Network Management, Kolmogorov Complexity, and Streptichrons" author: - name: "Amit B. Kulkarni" link: "https://researchr.org/alias/amit-b.-kulkarni" - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2000" month: "dec" abstract: "This report discusses the goals and requirements that drive the architecture for an active network. The active network management framework refers to the minimum model that describes components and interactions necessary to support management via an active network. An overview of the management architecture for today's passive networks is discussed as a prelude to the presenting a new active network management model. Finally, the new active network management model is developed a step further into the initial exploration of emergent behavior within an active network." links: "url": "http://www.research.ge.com/~bushsf" tags: - "meta-model" - "modeling" - "architecture" - "Kolmogorov complexity" - "Meta-Environment" researchr: "https://researchr.org/publication/Kulkarni2000" cites: 0 citedby: 0 institution: "General Electric Corporate Research and Development" number: "2000CRD107" kind: "techreport" key: "Kulkarni2000" - title: "Sync and Swarm Behavior for Sensor Networks" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2005" month: "Jun" abstract: "A key component in efficient and intelligent sensor networking is inducing collaborative behavior. We examine collaboration from the point of view of synchronizing activity. Power consumption and pulse-coupled oscillation are explored in terms of low power time synchronization. More complex synchronous patterns are examined via Boolean Network state trajectories. Boolean Networks have the characteristic of simple components, namely Boolean functions, with localized sets of inter-connections. The result, even with a random density of interconnections, can be a stable self-regulating system whose state settles into organized patterns. Such systems can be analyzed for their basins of attraction, attractor state cycles, and stability. In fact, known systems can be reverse engineered as a Boolean Network. Boolean networks can also be constructed to solve arbitrary computational problems, such as K-SAT. The self-regulating group behavior exhibited by Boolean Networks and their localized interactions makes them an enticing model for studying self-organization and self-configuration in complex systems." links: "url": "http://www.research.ge.com/~bushsf" tags: - "power consumption" - "synchronization" - "meta-model" - "Meta-Environment" researchr: "https://researchr.org/publication/Bush2005d" cites: 0 citedby: 0 booktitle: "Joint IEEE Communications Society and Aerospace Chapter Presentation" kind: "inproceedings" key: "Bush2005d" - title: "Active Virtual Network Management Prediction: Complexity as a Framework for Prediction, Optimization, and Assurance" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2002" month: "May" abstract: "Research into active networking has provided the incentive to re-visit what has traditionally been classified as distinct properties and characteristics of information transfer such as protocol versus service; at a more fundamental level this paper considers the blending of computation and communication by means of complexity. The specific service examined in this paper is network self-prediction enabled by Active Virtual Network Management Prediction. Computation/ communication is analyzed via Kolmogorov Complexity. The result is a mechanism to understand and improve the performance of active networking and Active Virtual Network Management Prediction in particular. The Active Virtual Network Management Prediction mechanism allows information, in various states of algorithmic and static form, to be transported in the service of prediction for network management. The results are generally applicable to algorithmic transmission of information. Kolmogorov Complexity is used and experimentally validated as a theory describing the relationship among algorithmic compression, complexity, and prediction accuracy within an active network. Finally, the paper concludes with a complexitybased framework for Information Assurance that attempts to take a holistic view of vulnerability analysis." links: "url": "http://www.research.ge.com/~bushsf/ftn/005-FINAL.pdf" tags: - "optimization" - "protocol" - "analysis" - "static analysis" - "Kolmogorov complexity" researchr: "https://researchr.org/publication/Bush2002b%3A0" cites: 0 citedby: 0 booktitle: "Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE) May 29-30, 2002, San Francisco, California, USA" kind: "inproceedings" key: "Bush2002b:0" - title: "Active Jitter Control" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Amit Kulkarni" link: "https://researchr.org/alias/amit-kulkarni" - name: "Scott Evans" link: "https://researchr.org/alias/scott-evans" - name: "Luiz Galup" link: "https://researchr.org/alias/luiz-galup" year: "2000" month: "Feb" abstract: "This study is the first known implementation of jitter control in an active network. Jitter control is performed by active packets in a distributed packet by packet basis within an active network rather than on a per flow basis as in today's passive networks. This provides many new benefits and challenges. The concept and results of an experimental validation of this method are presented." links: "url": "http://www.research.ge.com/~bushsf" tags: - "data validation" - "data-flow" researchr: "https://researchr.org/publication/Bush2000%3A0" cites: 0 citedby: 0 booktitle: "7th International IS\\&N Conference, Intelligence in Services and Networks (ISN) '00, Kavouri, Athens, Greece" kind: "inproceedings" key: "Bush2000:0" - title: "A Framework for Predictive Network Management of Predictive Mobile Networks" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Victor S. Frost" link: "https://researchr.org/alias/victor-s.-frost" year: "1999" doi: "http://www.cstp.umkc.edu/jnsm/vols/vol07_abs/07-2-bush.html" links: doi: "http://www.cstp.umkc.edu/jnsm/vols/vol07_abs/07-2-bush.html" tags: - "mobile" researchr: "https://researchr.org/publication/BushF99" cites: 0 citedby: 0 journal: "jnsm" volume: "7" number: "2" pages: "225-246" kind: "article" key: "BushF99" - title: "Kolmogorov Complexity for Information Assurance" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Scott C. Evans" link: "https://researchr.org/alias/scott-c.-evans" year: "2001" links: "url": "http://www.research.ge.com/~bushsf" tags: - "Kolmogorov complexity" - "C++" researchr: "https://researchr.org/publication/Bush2001b%3A0" cites: 0 citedby: 0 institution: "General Electric Corporate Research and Development" number: "2001CRD148" kind: "techreport" key: "Bush2001b:0" - title: "Detecting Distributed Denial-of-Service Attacks using Kolmogorov Complexity Metrics" author: - name: "Amit B. Kulkarni" link: "https://researchr.org/alias/amit-b.-kulkarni" - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Scott C. Evans" link: "https://researchr.org/alias/scott-c.-evans" year: "2001" month: "Dec" abstract: "This paper describes an approach to detecting distributed denial of service (DDoS) attacks that is based on fundamentals of information theory, specifically Kolmogorov complexity. The algorithm is based on a concept of Kolmogorov complexity that states that the joint complexity measure of random strings is lower than the sum of the complexities of the individual strings if the strings exhibit some correlation. Furthermore, the joint complexity measure varies inversely with the amount of correlation. The proposed algorithm exploits this feature to correlate traffic flows in the network and detect possible denial-of-service attacks. One of the strengths of this algorithm is that it does not require special filtering rules and hence it can be used to detect any type of DDoS attack. This algorithm is shown to perform better than simple packet-counting or load-measuring approaches." links: "url": "http://www.research.ge.com/~bushsf/ftn/2001crd176.pdf" tags: - "rule-based" - "Kolmogorov complexity" - "data-flow" - "rules" - "C++" - "type theory" - "systematic-approach" researchr: "https://researchr.org/publication/Kulkarni2001a" cites: 0 citedby: 0 institution: "GE Global Research Center" number: "2001CRD176" kind: "techreport" key: "Kulkarni2001a" - title: "Kolmogorov complexity estimates for detection of viruses in biologically inspired security systems: A comparison with traditional approaches" author: - name: "Sanjay Goel" link: "https://researchr.org/alias/sanjay-goel" - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2003" doi: "http://dx.doi.org/10.1002/cplx.20004" links: doi: "http://dx.doi.org/10.1002/cplx.20004" tags: - "Kolmogorov complexity" - "security" - "systematic-approach" researchr: "https://researchr.org/publication/GoelB03%3A0" cites: 0 citedby: 0 journal: "complexity" volume: "9" number: "2" pages: "54-73" kind: "article" key: "GoelB03:0" - title: "Wireless ad hoc nanoscale networking - industry perspectives" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2009" doi: "10.1109/MWC.2009.5300295" abstract: "Wireless ad hoc communication on the nanoscale will require thinking outside of the traditional radio spectrum. New applications will utilize new forms of wireless communication channels. For example, nanoscale communication will enable precise mechanisms for directly interacting with cells in vivo. Information may be sent to and from specific cells within the body, allowing detection and healing of diseases on the cellular scale. From a medical standpoint, the use of current wireless techniques to communicate with implants is unacceptable for many reasons, including bulky size, inability to use magnetic resonance imaging after implantation, potential radiation damage, surgical invasiveness, need to recharge/replace power, post-operative pain and long recovery times, and reduced quality of life for the patient. Better, more humane in vivo implant communication is needed. Development of both biological and engineered nanomachines is progressing; such machines will need to communicate [1]. Unfortunately, networking vast collections of nanoscale sensors and robots using current techniques, including wireless techniques, is not possible without communication mechanisms that exceed nanoscale volumes." tags: - "wireless sensor networks" researchr: "https://researchr.org/publication/Bush2009f" cites: 0 citedby: 0 journal: "IEEE_M_WC" volume: "16" number: "5" kind: "article" key: "Bush2009f" - title: "Mobile ATM Buffer Capacity Analysis" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Joseph B. Evans" link: "https://researchr.org/alias/joseph-b.-evans" - name: "Victor Frost" link: "https://researchr.org/alias/victor-frost" year: "1996" tags: - "analysis" - "mobile" researchr: "https://researchr.org/publication/BushEF96" cites: 0 citedby: 0 journal: "monet" volume: "1" number: "1" pages: "67-73" kind: "article" key: "BushEF96" - title: "Network Characteristics of Carbon Nanotubes: A Graph Eigenspectrum Approach and Tool Using Mathematica" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Yun Li" link: "https://researchr.org/alias/yun-li" year: "2006" abstract: "This paper reports advances in analyzing the network structure of carbon nanotube (CNT) networks. CNT devices continue to receive attention for a variety of applications. Unfortunately, understanding the characteristics of random networks formed by such tubes has stymied progress. With respect to transistors constructed from CNT networks, electron and hole mobility provide a measure of the rate of current flow as a gate voltage is applied. The higher the mobility, the faster the gate can switch; this leads to faster computation and faster processors, e.g. faster routers, wireless links, computers, etc. Mobility is relatively easy to predict for a single carbon nanotube. Unfortunately, mobility becomes extremely complex for networks of tubes. The performance of pure carbon nanotube networks and networks with impurities has been complicated by their random network structures. A model to predict CNT network device performance based on randomized tube layout and metallic tube characteristics has been needed in order to explore CNT network performance. This report develops a mathematical network model, implemented in Mathematica, based upon the eigenspectrum of the graph laplacian of the network. This technique allows the impact of individual tube characteristics on the entire network structure to be analyzed in detail rather than requiring aggregate and often-inaccurate estimates. The analytically derived values using the eigenspectrum approach are shown to match trends obtained from experimental measurements. Future technical reports will use this model to provide guidance in identifying methods to improve performance based upon such characteristics as distributions of tube angles and tube lengths. Mathematica commands are included in this report to demonstrate the operation of the software tool implementing the analysis as well as the theory behind its operation." links: "url": "http://www.research.ge.com/~bushsf/pdfpapers/2006GRC023_Final_ver.pdf" tags: - "rule-based" - "layout" - "meta-model" - "analysis" - "data-flow" - "graph-rewriting" - "Meta-Environment" - "rewriting" - "data-flow analysis" - "routing" - "process modeling" - "systematic-approach" researchr: "https://researchr.org/publication/Bush2006b%3A0" cites: 0 citedby: 0 institution: "GE Global Research" number: "2006GRC023" kind: "techreport" key: "Bush2006b:0" - title: "Low-Energy Network Time Synchronization as an Emergent Property" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2005" month: "Oct" abstract: "The primary contribution of this work is to examine the energy efficiency of pulse coupled oscillation for time synchronization in a realistic wireless network environment and to explore the impact of mobility on convergence rate. Energy coupled oscillation is susceptible to interference; this approach uses reception and decoding of short packet bursts to eliminate this problem. The energy efficiency of a commonly used timestamp broadcast algorithm is compared and contrasted with pulse-coupled oscillation. The emergent pulse coupled oscillation technique shows greater energy efficiency as well as robustness with mobility. The algorithm specifically includes the likelihood that some proportion of the sensors may include GPS receivers in order to obtain and propagate a master clock time." links: "url": "http://www.research.ge.com/~bushsf" tags: - "synchronization" - "wireless sensor networks" - "Meta-Environment" - "systematic-approach" researchr: "https://researchr.org/publication/Bush2005h" cites: 0 citedby: 0 booktitle: "Proceedings of the Fourteenth International Conference on Computer Communications and Networks (IEEE ICCCN)" kind: "inproceedings" key: "Bush2005h" - title: "Biological Models of Security for Virus Propagation in Computer Networks" author: - name: "Sanjay Goel" link: "https://researchr.org/alias/sanjay-goel" - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2004" month: "Dec" abstract: "This aricle discusses the similarity between the propagation of pathogens (viruses and worms) on computer networks and the proliferation of pathogens in cellular organisms (organisms with genetic material contained within a membrane-encased nucleus). It introduces several biological mechanisms which are used in these organisms to protect against such pathogens and presents security models for networked computers inspired by several biological paradigms, including genomics (RNA interference), proteomics (pathway mapping), and physiology (immune system). In addition, the study of epidemiological models for disease control can inspire methods for controlling the spread of pathogens across multiple nodes of a network. It also presents results based on the authorsâ?? research in immune system modeling." links: "url": "http://www.research.ge.com/~bushsf" tags: - "control systems" - "rule-based" - "meta-model" - "modeling" - "security" - "Meta-Environment" researchr: "https://researchr.org/publication/Goel2004a" cites: 0 citedby: 0 journal: ";Login;" volume: "29" number: "6" kind: "article" key: "Goel2004a" - title: "Genetically Induced Communication Network Fault Tolerance" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2003" month: "Nov" abstract: "This paper presents the architecture and initial feasibility results of a proto-type communication network that utilizes genetic programming to evolve services and protocols as part of network operation. The network evolves responses to environmental conditions in a manner that could not be pre-programmed within legacy network nodes a priori. A priori in this case means before network operation has begun. Genetic material is exchanged, loaded, and run dynamically within an active network. The transfer and execution of code in support of the evolution of network protocols and services would not be possible without the active network environment. Rapid generation of network service code occurs via a genetic programming paradigm. Complexity and Algorithmic Information Theory play a key role in understanding and guiding code evolution within the network." links: "url": "http://www.research.ge.com/~bushsf" tags: - "meta programming" - "protocol" - "architecture" - "programming paradigms" - "code generation" - "programming" - "genetic programming" - "type theory" - "Meta-Environment" researchr: "https://researchr.org/publication/Bush2003n" cites: 0 citedby: 0 journal: "Complexity Journal" volume: "9" number: "2" kind: "article" key: "Bush2003n" - title: "The Limits of Motion Prediction Support for Ad hoc Wireless Network Performance" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Nathan Smith" link: "https://researchr.org/alias/nathan-smith" year: "2005" month: "Jun" abstract: "A fundamental understanding of gain provided by motion prediction in wireless ad hoc routing is currently lacking. This paper examines benefits in routing obtainable via prediction. A theoretical best-case non-predictive routing model is quantified in terms of both message overhead and update time for non-predictive routing. This best- case model of existing routing performance is compared with predictive routing. Several specific instances of predictive improvements in routing are examined. The primary contribution of this paper is quantification of predictive gain for wireless ad hoc routing." links: "url": "http://www.research.ge.com/~bushsf" tags: - "wireless" - "meta-model" - "network" - "Meta-Environment" - "routing" - "performance" - "motion prediction" researchr: "https://researchr.org/publication/Bush2005a" cites: 0 citedby: 0 booktitle: "Proceedings of the 2005 International Conference on Wireless Networks (ICWN-05)" kind: "inproceedings" key: "Bush2005a" - title: "Active Network Management and Kolmogorov Complexity" author: - name: "Amit B. Kulkarni" link: "https://researchr.org/alias/amit-b.-kulkarni" - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2001" month: "Apr" abstract: "This paper seeks to describe new and better ways to represent network health and thus attempts to explore concepts other than those based on network topology-based representations of network management. It examines the manner in which active network management can benefit from Algorithmic Information Theory. Due to the new paradigm and enhanced capabilities of active networks, this work proceeds along the lines that a new perspective that incorporates Algorithmic Information Theory can provide superior, innovative solutions for network management." links: "url": "http://www.research.ge.com/~bushsf" tags: - "rule-based" - "Kolmogorov complexity" - "information theory" researchr: "https://researchr.org/publication/Kulkarni2001b%3A0" cites: 0 citedby: 0 booktitle: "Proceedings of IEEE OpenArch 2001" kind: "inproceedings" key: "Kulkarni2001b:0" - title: "Characteristics of Carbon Nanotube Networks: The Impact of a Metallic Nanotube on a CNT Network" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Yun Li" link: "https://researchr.org/alias/yun-li" year: "2006" month: "June" abstract: "The impact of metallic carbon nanotubes on a carbon nanotube (CNT) network structure is evaluated. Metallic tubes reduce the mobility of CNT networks, thus reducing their switching speed in electronic devices. It is anticipated that certain CNT network layouts or topologies will be more resilient to the impact of metallic tubes. Classes of networks have been identified such as regular, random, and scale-free. This study considers the performance of a variety of network classes in the presence of a metallic tube. Mathematica commands are included in this report to demonstrate the operation of the software tool implementing the analysis as well as the theory behind its operation. While these results provide direction for possible nanotube topology design rules, more work needs to be done to verify and extend these results." links: "url": "http://www.research.ge.com/~bushsf/pdfpapers/2006GRC397_final_ver.pdf" tags: - "rule-based" - "layout" - "analysis" - "rules" - "design" researchr: "https://researchr.org/publication/Bush2006a%3A0" cites: 0 citedby: 0 institution: "GE Global Research" number: "2006GRC397" kind: "techreport" key: "Bush2006a:0" - title: "A control and management network for wireless ATM systems" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Sunil Jagannath" link: "https://researchr.org/alias/sunil-jagannath" - name: "Ricardo Sanchez" link: "https://researchr.org/alias/ricardo-sanchez" - name: "Joseph B. Evans" link: "https://researchr.org/alias/joseph-b.-evans" - name: "Victor S. Frost" link: "https://researchr.org/alias/victor-s.-frost" - name: "Gary J. Minden" link: "https://researchr.org/alias/gary-j.-minden" - name: "K. Sam Shanmugan" link: "https://researchr.org/alias/k.-sam-shanmugan" year: "1997" doi: "http://dx.doi.org/10.1023/A:1019117603571" links: doi: "http://dx.doi.org/10.1023/A:1019117603571" tags: - "control systems" researchr: "https://researchr.org/publication/BushJSEFMS97" cites: 0 citedby: 0 journal: "winet" volume: "3" number: "4" pages: "267-283" kind: "article" key: "BushJSEFMS97" - title: "Information Warfare Strategy and Control Analysis" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Bruce Barnett" link: "https://researchr.org/alias/bruce-barnett" year: "1999" abstract: "This precis describes a tool for quantifying the vulnerability of a communications network. It is important that information warfare studies include both offensive and defensive strategies in an integrated manner since neither can be studied in isolation. It is assumed that an attacker has a finite amount of resources with which to discover faults in the network security of a data communications network and that each fault discovery consumes the attackersâ?? resources. Network security actions may be taken to increase security in strategic areas of the network and to actively deter an attack. Reactions such as these by network security in response to an attack have a both a monetary cost and a cost in terms of reduction of network resources and degradation of services to network consumers. An optimal course of action by network security in response to an attack is to minimize network access to an attacker while also minimizing the impact to legitimate network consumers. This requires precise assessment of network security vulnerability and quantification of effects on network consumers by actions taken by network security in response to an attack. This white paper proposes incorporating methods and algorithms into an existing proto-type tool that we have developed for using vulnerability information collected from an actual network and simulating the results of an attack so the command and control strategies can be studied." links: "url": "http://www.research.ge.com/~bushsf/pdfpapers/nvaprecis.pdf" tags: - "discovery" - "analysis" - "data-flow" - "security" - "access control" - "data-flow analysis" researchr: "https://researchr.org/publication/Bush" cites: 0 citedby: 0 kind: "unpublished" key: "Bush" - title: "A Control and Management Network for Wireless ATM Systems" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Sunil Jagannath" link: "https://researchr.org/alias/sunil-jagannath" - name: "Joseph B. Evans" link: "https://researchr.org/alias/joseph-b.-evans" - name: "Victor Frost" link: "https://researchr.org/alias/victor-frost" - name: "Gary Minden" link: "https://researchr.org/alias/gary-minden" - name: "K. Sam Shanmugan" link: "https://researchr.org/alias/k.-sam-shanmugan" year: "1997" abstract: "This paper describes the design of a control and management network (orderwire) for a mobile wireless Asynchronous Transfer Mode (ATM) network. This mobile wireless ATM network is part of the Rapidly Deployable Radio Network (RDRN). The orderwire system consists of a packet radio network which overlays the mobile wireless ATM network, each network element in this network uses Global Positioning System (GPS) information to control a beamforming antenna subsystem which provides for spatial reuse. This paper also proposes a novel Virtual Network Configuration (VNC) algorithm for predictive network configuration. A mobile ATM Private Network-Network Interface (PNNI) based on VNC is also discussed. Finally, as a prelude to the system implementation, results of a Maisie simulation of the orderwire system are discussed." links: "url": "http://www.research.ge.com/~bushsf" tags: - "control systems" - "rule-based" - "deployment" - "network" - "reuse" - "design" - "mobile" researchr: "https://researchr.org/publication/Bush1997a" cites: 0 citedby: 0 journal: "ACM-Baltzer Wireless Networks (WINET)" volume: "3" kind: "article" key: "Bush1997a" - title: "A Security Vulnerability Assessment Technique and Model" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Bruce Barnett" link: "https://researchr.org/alias/bruce-barnett" year: "1998" month: "Jan" abstract: "This paper presents a framework and a tool for quantifying the security of a communication network. The framework is compared to some aspects of the human immune system providing insights into methods of quantifying vulnerabilities, detecting an intruder, and fighting an attack. It is assumed that an attacker has a finite amount of resources with which to discover faults in the network security of a data communications network and that each fault discovery consumes the attackers' resources. Extensions of this method in light of knowledge of the operation of the human immune system are explored. Network security actions may be taken to increase security in strategic areas of the network and to actively pursue an attacker. Reactions such as these by network security in response to an attack have a cost in terms of network resources and degradation of services to network consumers. An optimal course of action by network security in response to an attack is to minimize network access to an attacker while also minimizing the impact to legitimate network consumers. The optimal course of action by network security personnel requires precise assessment of network security vulnerability, quantification of effects on network consumers by actions taken by network security in response to an attack, and a framework for applying the vulnerability assessment." links: "url": "http://www.research.ge.com/~bushsf" tags: - "discovery" - "data-flow" - "security" researchr: "https://researchr.org/publication/Bush1998%3A0" cites: 0 citedby: 0 institution: "General Electric Corporate Research and Development Center" number: "98CRD028" kind: "techreport" key: "Bush1998:0" - title: "A simple metric for ad hoc network adaptation" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2005" doi: "http://doi.ieeecomputersociety.org/10.1109/JSAC.2005.857204" links: doi: "http://doi.ieeecomputersociety.org/10.1109/JSAC.2005.857204" researchr: "https://researchr.org/publication/Bush05%3A0" cites: 0 citedby: 0 journal: "jsac" volume: "23" number: "12" pages: "2272-2287" kind: "article" key: "Bush05:0" - title: "Low-Energy Network Time Synchronization as an Emergent Property" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2005" month: "Oct" abstract: "The primary contribution of this work is to examine the energy efficiency of pulse coupled oscillation for time synchronization in a realistic wireless network environment and to explore the impact of mobility on convergence rate. Energy coupled oscillation is susceptible to interference; this approach uses reception and decoding of short packet bursts to eliminate this problem. The energy efficiency of a commonly used timestamp broadcast algorithm is compared and contrasted with pulse-coupled oscillation. The emergent pulse coupled oscillation technique shows greater energy efficiency as well as robustness with mobility. The algorithm specifically includes the likelihood that some proportion of the sensors may include GPS receivers in order to obtain and propagate a master clock time." links: "url": "http://www.research.ge.com/~bushsf" tags: - "synchronization" - "wireless sensor networks" - "Meta-Environment" - "systematic-approach" researchr: "https://researchr.org/publication/Bush2005h%3A0" cites: 0 citedby: 0 booktitle: "Proceedings of the Fourteenth International Conference on Computer Communications and Networks (IEEE ICCCN)" kind: "inproceedings" key: "Bush2005h:0" - title: "On The Effectiveness of Kolmogorov Complexity Estimation to Discriminate Semantic Types" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Todd Hughes" link: "https://researchr.org/alias/todd-hughes" year: "2003" month: "Nov" abstract: "We present progress on the experimental validation of a fundamental and universally applicable vulnerability analysis framework that is capable of identifying new types of vulnerabilities before attackers innovate attacks. This new framework proactively identifies system components that are vulnerable based upon their Kolmogorov Complexity estimates and it facilitates prediction of previously unknown vulnerabilities that are likely to be exploited by future attack methods. A tool that utilizes a growing library of complexity estimators is presented. This work is an incremental step towards validation of the concept of complexity-based vulnerability analysis. In particular, results indicate that data types (semantic types) can be identified by estimates of their complexity. Thus, a map of complexity can identify suspicious types, such as executable data embedded within passive data types, without resorting to predefined headers, signatures, or other limiting a priori information" links: "url": "http://www.research.ge.com/~bushsf" tags: - "data validation" - "rule-based" - "analysis" - "type system" - "Kolmogorov complexity" - "data-flow" - "data-flow analysis" - "incremental" researchr: "https://researchr.org/publication/Bush2003a%3A0" cites: 0 citedby: 0 booktitle: "Proceedings of the SFI Workshop on Resilient and Adaptive Defense of Computing Networks 2003" kind: "inproceedings" key: "Bush2003a:0" - title: "Characteristics of Carbon Nanotube Networks: The Impact of a Metallic Nanotube on a CNT Network" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Yun Li" link: "https://researchr.org/alias/yun-li" year: "2006" month: "June" abstract: "The impact of metallic carbon nanotubes on a carbon nanotube (CNT) network structure is evaluated. Metallic tubes reduce the mobility of CNT networks, thus reducing their switching speed in electronic devices. It is anticipated that certain CNT network layouts or topologies will be more resilient to the impact of metallic tubes. Classes of networks have been identified such as regular, random, and scale-free. This study considers the performance of a variety of network classes in the presence of a metallic tube. Mathematica commands are included in this report to demonstrate the operation of the software tool implementing the analysis as well as the theory behind its operation. While these results provide direction for possible nanotube topology design rules, more work needs to be done to verify and extend these results." links: "url": "http://www.research.ge.com/~bushsf/pdfpapers/2006GRC397_final_ver.pdf" tags: - "rule-based" - "layout" - "analysis" - "rules" - "design" researchr: "https://researchr.org/publication/Bush2006a" cites: 0 citedby: 0 institution: "GE Global Research" number: "2006GRC397" kind: "techreport" key: "Bush2006a" - title: "Active Virtual Network Management Prediction: Complexity as a Framework for Prediction, Optimization, and Assurance" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2002" doi: "http://csdl.computer.org/comp/proceedings/dance/2002/1564/00/15640534abs.htm" links: doi: "http://csdl.computer.org/comp/proceedings/dance/2002/1564/00/15640534abs.htm" tags: - "optimization" researchr: "https://researchr.org/publication/Bush02" cites: 0 citedby: 0 pages: "534" booktitle: "dance" kind: "inproceedings" key: "Bush02" - title: "Active Virtual Network Management Prediction: Complexity as a Framework for Prediction, Optimization, and Assurance" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2002" month: "May" abstract: "Research into active networking has provided the incentive to re-visit what has traditionally been classified as distinct properties and characteristics of information transfer such as protocol versus service; at a more fundamental level this paper considers the blending of computation and communication by means of complexity. The specific service examined in this paper is network self-prediction enabled by Active Virtual Network Management Prediction. Computation/ communication is analyzed via Kolmogorov Complexity. The result is a mechanism to understand and improve the performance of active networking and Active Virtual Network Management Prediction in particular. The Active Virtual Network Management Prediction mechanism allows information, in various states of algorithmic and static form, to be transported in the service of prediction for network management. The results are generally applicable to algorithmic transmission of information. Kolmogorov Complexity is used and experimentally validated as a theory describing the relationship among algorithmic compression, complexity, and prediction accuracy within an active network. Finally, the paper concludes with a complexitybased framework for Information Assurance that attempts to take a holistic view of vulnerability analysis." links: "url": "http://www.research.ge.com/~bushsf/ftn/005-FINAL.pdf" tags: - "optimization" - "protocol" - "analysis" - "static analysis" - "Kolmogorov complexity" researchr: "https://researchr.org/publication/Bush2002b" cites: 0 citedby: 0 booktitle: "Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE) May 29-30, 2002, San Francisco, California, USA" kind: "inproceedings" key: "Bush2002b" - title: "A Control and Management Network for Wireless ATM Systems" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Sunil Jagannath" link: "https://researchr.org/alias/sunil-jagannath" - name: "Joseph B. Evans" link: "https://researchr.org/alias/joseph-b.-evans" - name: "Victor Frost" link: "https://researchr.org/alias/victor-frost" year: "1996" month: "June" abstract: "This work provides the results of the on-going design and implementation of a control and management network (an orderwire) for a mobile wireless ATM system. There are novel uses for an orderwire which receives time and position from the Global Positioning System (GPS). Position information is used for such things as beam steering and determination of switch to host associations. The accurate time provided by the GPS is used by the network configuration system for a proposed rapid configuration algorithm." links: "url": "http://www-ee.uta.edu/organizations/commsoc/commsoft.html" tags: - "control systems" - "design" - "mobile" researchr: "https://researchr.org/publication/Bush1996" cites: 0 citedby: 0 booktitle: "Proceedings of the International Communications Conference '96" kind: "inproceedings" key: "Bush1996" - title: "Kolmogorov Complexity Estimates For Detection Of Viruses In Biologically Inspired Security Systems: A Comparison With Traditional Approaches" author: - name: "Sanjay Goel" link: "https://researchr.org/alias/sanjay-goel" - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2003" month: "Nov" abstract: "This paper presents results in two mutually complementary areas: distributed immunological information assurance and a new signature matching technique based upon Kolmogorov Complexity. This paper introduces a distributed model for security based on biological paradigms of Epidemiology and Immunology. In this model each node in the network has an immune system that identifies and destroys pathogens in the incoming network traffic as well as files resident on the node. The network nodes present a collective defense to the pathogens by working symbiotically and sharing pathogen information with each other. Each node compiles a list of pathogens that are perceived as threats by using information provided from all the nodes in the network. The signatures for these pathogens are incorporated into the detector population of the immune systems to increase the probability of detection. Critical to the success of this system is the detection scheme, which should not only be accurate but also efficient. Three separate schemes for detecting pathogens are examined, namely, Contiguous string matching, Hamming Distance, and Kolmogorov Complexity. This work provides a model of the system and examines the efficiency of different detection schemes. A simulation model is built to study the sensitivity of model parameters, such as signature length, sampling rate, network topology, etc. to detection of pathogens." links: "url": "http://www.research.ge.com/~bushsf/pdfpapers/ImmunoComplexity.pdf" tags: - "rule-based" - "meta-model" - "Kolmogorov complexity" - "security" - "compiler" - "information models" - "Meta-Environment" - "systematic-approach" researchr: "https://researchr.org/publication/Goel2003" cites: 0 citedby: 0 booktitle: "Invited Paper: SFI Workshop: Resilient and Adaptive Defense of Computing Networks 2003" kind: "inproceedings" key: "Goel2003" - title: "Network Management of Predictive Mobile Networks" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Victor S. Frost" link: "https://researchr.org/alias/victor-s.-frost" - name: "Joseph B. Evans" link: "https://researchr.org/alias/joseph-b.-evans" year: "1999" month: "Jun" abstract: "There is a trend toward the use of predictive systems in communications networks. At the systems and network management level predictive capabilities are focused on anticipating network faults and performance degradation. Simultaneously, mobile communication networks are being developed with predictive location and tracking mechanisms. The interactions and synergies between these systems present a new set of problems. A new predictive network management framework is developed and examined. The interaction between a predictive mobile network and the proposed network management system is discussed. The Rapidly Deployable Radio Network is used as a specific example to illustrate these interactions." links: "url": "http://www.crd.ge.com/people/bush" tags: - "deployment" - "network" - "mobile" researchr: "https://researchr.org/publication/Bush1999a%3A0" cites: 0 citedby: 0 journal: "Journal of Network and Systems Management" volume: "7" number: "2" kind: "article" key: "Bush1999a:0" - title: "Active Networks and Active Network Management: A Proactive Management Framework" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Amit B. Kulkarni" link: "https://researchr.org/alias/amit-b.-kulkarni" year: "2001" abstract: "Active networking is an exciting new paradigm in digital networking that has the potential to revolutionize the manner in which communication takes place. It is an emerging technology, one in which new ideas are constantly being formulated and new topics of research are springing up even as this book is being written. This technology is very likely to appeal to a broad spectrum of users from academia and industry. Therefore, this book was written in a way that enables all these groups to understand the impact of active networking in their sphere of interest. Information services managers, network administrators, and e-commerce developers would like to know the potential benefits of the new technology to their businesses, networks, and applications. The book introduces the basic active networking paradigm and its potential impacts on the future of information handling in general and on communications in particular. This is useful for forward-looking businesses that wish to actively participate in the development of active networks and ensure a head start in the integration of the technology in their future products, be they applications or networks. Areas in which active networking is likely to make significant impact are identified, and the reader is pointed to any related ongoing research efforts in the area. The book also provides a deeper insight into the active networking model for students and researchers, who seek challenging topics that define or extend frontiers of the technology. It describes basic components of the model, explains some of the terms used by the active networking community, and provides the reader with taxonomy of the research being conducted at the time this book was written. Current efforts are classified based on typical research areas such as mobility, security, and management. The intent is to introduce the serious reader to the background regarding some of the models adopted by the community, to outline outstanding issues concerning active networking, and to provide a snapshot of the fast-changing landscape in active networking research. Management is a very important issue in active networks because of its open nature. The latter half of the book explains the architectural concepts of a model for managing active networks and the motivation for a reference model that addresses limitations of the current network management framework by leveraging the powerful features of active networking to develop an integrated framework. It also describes a novel application enabled by active network technology called the Active Virtual Network Management Prediction (AVNMP) algorithm. AVNMP is a proactive management system; in other words, it provides the ability to solve a potential problem before it impacts the system by modeling network devices within the network itself and running that model ahead of real time." links: "url": "http://www.research.ge.com/~bushsf" tags: - "rule-based" - "application framework" - "meta-model" - "modeling" - "architecture" - "model-driven development" - "source-to-source" - "security" - "e-science" - "information models" - "Meta-Environment" - "taxonomy" - "open-source" researchr: "https://researchr.org/publication/Bush2001%3A0" cites: 0 citedby: 0 publisher: "Kluwer Academic/Plenum Publishers" isbn: "0-306-46560-4" kind: "book" key: "Bush2001:0" - title: "Mobile ATM Buffer Capacity Analysis" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Joseph B. Evans" link: "https://researchr.org/alias/joseph-b.-evans" - name: "Victor Frost" link: "https://researchr.org/alias/victor-frost" year: "1996" month: "February" abstract: "This paper extends a stochastic theory for buffer fill distribution for multiple ``on'' and ``off'' sources to a mobile environment. Queue fill distribution is described by a set of differential equations assuming sources alternate asynchronously between exponentially distributed periods in ``on'' and ``off'' states. This paper includes the probabilities that mobile sources have links to a given queue. The sources represent mobile user nodes, and the queue represents the capacity of a switch. This paper presents a method of analysis which uses mobile parameters such as speed, call rates per unit area, cell area, and call duration and determines queue fill distribution at the ATM cell level. The analytic results are compared with simulation results." links: "url": "http://www.crd.ge.com/people/bush" tags: - "points-to analysis" - "analysis" - "source-to-source" - "Meta-Environment" - "buffer" - "mobile" - "open-source" researchr: "https://researchr.org/publication/Bush1996b%3A0" cites: 0 citedby: 0 journal: "ACM-Baltzer Mobile Networks and Nomadic Applications (NOMAD)" volume: "1" number: "1" kind: "article" key: "Bush1996b:0" - title: "Brittle System Analysis" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "John Hershey" link: "https://researchr.org/alias/john-hershey" - name: "Kirby Vosburgh" link: "https://researchr.org/alias/kirby-vosburgh" year: "1999" month: "Apr" abstract: "The goal of this paper is to define and analyze systems which exhibit brittle behavior. This behavior is characterized by a sudden and steep decline in performance as the system state changes. This can be due to input parameters which exceed a specified input, or environmental conditions which exceed specified operating boundaries." links: "url": "http://www.research.ge.com/~bushsf" tags: - "operating system" - "analysis" researchr: "https://researchr.org/publication/Bush1999%3A0" cites: 0 citedby: 0 kind: "article" key: "Bush1999:0" - title: "Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics" author: - name: "Amit B. Kulkarni" link: "https://researchr.org/alias/amit-b.-kulkarni" - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2006" doi: "http://dx.doi.org/10.1007/s10922-005-9016-3" links: doi: "http://dx.doi.org/10.1007/s10922-005-9016-3" tags: - "Kolmogorov complexity" researchr: "https://researchr.org/publication/KulkarniB06" cites: 0 citedby: 0 journal: "jnsm" volume: "14" number: "1" pages: "69-80" kind: "article" key: "KulkarniB06" - title: "Extended Abstract: Complexity and Vulnerability Analysis" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2003" month: "Jun" abstract: "An active network allows packets to contain a mixture of code (algorithm) and data. The ratio of code to data can vary as the packet travels through the network. Such networks can also be vulnerable to attack via the transport of virus or worm code. A mitigation of this problem has been attempted via the use of active network probes to detect vulnerabilities in an active network. A complexity estimate of active protocols being transported within the network by active packets is obtained. In addition components within the active network contain probe points through which bit-level I/O can be collected. Kolmogorov Complexity estimates based upon simple inverse compression ratios have used to estimate vulnerability. The intent has been to experiment with better complexity measures as the research continues. Consider the complexity of bit-level input and output strings concatenated together. That is, observe an input sequence to an arbitrary process (i.e. a potentially vulnerable process) at the bit-level and concatenate with an output sequence at the bit-level. This input/output concatenation can be applied to entire systems or to components of a system. If there is low complexity in the I/O observations, then it is likely to be easy for an attacker to \"understand\" and usurp that component." links: "url": "http://dimacs.rutgers.edu/Workshops/Inference/abstracts.html" tags: - "rule-based" - "protocol" - "points-to analysis" - "analysis" - "Kolmogorov complexity" - "data-flow" - "source-to-source" - "data-flow analysis" - "open-source" researchr: "https://researchr.org/publication/Bush2003i" cites: 0 citedby: 0 booktitle: "Invited Paper: SFI Workshop: Resilient and Adaptive Defense of Computing Networks 2003" kind: "inproceedings" key: "Bush2003i" - title: "Kolmogorov Complexity Estimates For Detection Of Viruses In Biologically Inspired Security Systems: A Comparison With Traditional Approaches" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Sanjay Goel" link: "https://researchr.org/alias/sanjay-goel" year: "2003" month: "Nov" abstract: "This paper presents results in two mutually complementary areas: distributed immunological information assurance and a new signature matching technique based upon Kolmogorov Complexity. This paper introduces a distributed model for security based on biological paradigms of Epidemiology and Immunology. In this model each node in the network has an immune system that identifies and destroys pathogens in the incoming network traffic as well as files resident on the node. The network nodes present a collective defense to the pathogens by working symbiotically and sharing pathogen information with each other. Each node compiles a list of pathogens that are perceived as threats by using information provided from all the nodes in the network. The signatures for these pathogens are incorporated into the detector population of the immune systems to increase the probability of detection. Critical to the success of this system is the detection scheme, which should not only be accurate but also efficient. Three separate schemes for detecting pathogens are examined, namely, Contiguous string matching, Hamming Distance, and Kolmogorov Complexity. This work provides a model of the system and examines the efficiency of different detection schemes. A simulation model is built to study the sensitivity of model parameters, such as signature length, sampling rate, network topology, etc. to detection of pathogens." links: "url": "http://www.research.ge.com/~bushsf" tags: - "rule-based" - "meta-model" - "Kolmogorov complexity" - "security" - "compiler" - "information models" - "Meta-Environment" - "systematic-approach" researchr: "https://researchr.org/publication/Bush2003o%3A0" cites: 0 citedby: 0 journal: "Complexity Journal" volume: "9" number: "2" kind: "article" key: "Bush2003o:0" - title: "Genetically Induced Communication Network Fault Tolerance" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" year: "2003" doi: "http://dx.doi.org/10.1002/cplx.20002" abstract: "This paper presents the architecture and initial feasibility results of a proto-type communication network that utilizes genetic programming to evolve services and protocols as part of network operation. The network evolves responses to environmental conditions in a manner that could not be preprogrammed within legacy network nodes a priori. A priori in this case means before network operation has begun. Genetic material is exchanged, loaded, and run dynamically within an active network. The transfer and execution of code in support of the evolution of network protocols and services would not be possible without the active network environment. Rapid generation of network service code occurs via a genetic programming paradigm. Complexity and Algorithmic Information Theory play a key role in understanding and guiding code evolution within the network." links: doi: "http://dx.doi.org/10.1002/cplx.20002" "url": "http://www.research.ge.com/~bushsf/pdfpapers/ComplexityJournal.pdf" tags: - "meta programming" - "protocol" - "architecture" - "programming paradigms" - "code generation" - "programming" - "genetic programming" - "type theory" - "Meta-Environment" researchr: "https://researchr.org/publication/Bush2004%3A0" cites: 0 citedby: 0 journal: "Complexity Special Issue: \"Resilient \\& Adaptive Defense of Computing Networks\"" volume: "9" number: "2" kind: "article" key: "Bush2004:0" - title: "Nano-Communications: A New Field? An Exploration into a Carbon Nanotube Communication Network" author: - name: "Stephen Bush" link: "http://www.research.ge.com/~bushsf/" - name: "Yun Li" link: "https://researchr.org/alias/yun-li" year: "2006" month: "February" abstract: "Imagine a communication network constructed at a nanometer scale. This paper examines the potential benefits from the perspective of using individual nanotubes within random carbon nanotube networks (CNT) to carry information. This is distinct from traditional, potentially less efficient, approaches of using CNT networks to construct transistors. The traditional networking protocol stack is inverted in this approach because, rather than the network layer being logically positioned above the physical and link layers, the CNT network and routing of information is an integral part of the physical layer. Single-walled carbon nanotubes (SWNT) are modelled as linear tubes positioned in two dimensions via central coordinates with a specified angle. A distribution of lengths and angles may be specified. A network graph is extracted from the layout of the tubes and the unprecedented ability to route information close to the level of individual nanotubes is considered. The impact of random tube characteristics, such as location and angle, upon the corresponding network graph and its impacts are examined." links: "url": "http://www.research.ge.com/\\~{}bushsf/pdfpapers/2006GRC066\\_Final\\_ver.pdf" tags: - "layout" - "meta-model" - "protocol" - "graph-rewriting" - "information models" - "Meta-Environment" - "rewriting" - "routing" - "systematic-approach" researchr: "https://researchr.org/publication/Bush2006%3A0" cites: 0 citedby: 0 institution: "GE Global Research" number: "2006GRC066" kind: "techreport" key: "Bush2006:0"