Code 5544 is the Network Security Section in the Center for High Assurance Computer Systems Branch of the Information Technology Division.

Code 5544 provides the Navy's core in-house expertise in the research and development of Network Security solutions. Engineers work closely with the warfighter, Navy policy managers and other government agencies to develop network security architectures and solutions (e.g., components, toolkits, equipment, and systems) to meet Navy and joint service requirements. Code 5544 also performs in-house analyses and testing to evaluate current and emerging network security solutions and determine their applicability to Navy and DoD network security architectures. The major areas of work are listed as follows:

Computer Network Defense
  • Security Information and Event Management
    • Development and implementation of high assurance systems to aggregate security data feeds from diverse sources across networks.
    • Development of high assurance systems that normalize network-wide security data to provide a single, holistic view of network health and status.
    • Optimization of existing network monitoring processes utilizing developed systems to increase the efficiency and area of coverage for the network security operator.
  • Business Intelligence
    • Utilization of Business Intelligence framework to maximize the usefulness of historical and near real-time computer network defense data.
    • Developed and implemented the first system of its kind to allow an enterprise to track threats/warnings over time to understand historical trends and their relation to current network state.
    • Implementation of I/O separation of read-centric operations from write-centric optimized relational databases.
  • Slow and Low Intrusion Detection
    • Development of capabilities utilizing existing security architecture platform to detect network misuse/compromises potentially indicative of an intrusion not visible to traditional network security appliances.
  • Visualization
    • Implementation of systems to dynamically and visually display the network topological/geographical location of actors, targets, and hops of a detected intrusion.

Selected Publications

2019 Shing L, Wollaber A, Chikkagoudar S, Yuen J, Alvino P, Chambers A, Allard T.  2019.  Extracting Workflows from Natural Language Documents: A First Step. First International Workshop on Artificial Intelligence for Business Process Management (AI4BPM). :294-300.PDF icon AI4BPM_Shing_et_al.pdf (283.95 KB)
2018 Blowers M, Harney H, Wehner G.  2018.  Preventing the “Killer Robot” Scenario. NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defense and Resilience. :22-25.PDF icon Report of IST-152 workshop Prague 2017.pdf (1.15 MB)
2018 Guarino A, Komárková J, Rowell J.  2018.  “Hello, World” Autonomous Agent. NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defense and Resilience. :26-31.PDF icon Report of IST-152 workshop Prague 2017.pdf (1.15 MB)
2018 Blakely B, Henshel D, Wehner G, Rowell J.  2018.  Toward a Taxonomy of Fundamental System Properties of Cyber Resilience. NATO IST-153 Workshop on Cyber Resilience. :2-6.PDF icon Report of IST-153 workshop Munich 2017.pdf (1.55 MB)
2018 Macklin T, West P.  2018.  Towards a Trustworthy Foundation for Assured Autonomous Systems. Specialist's Meeting on Mission Assurance for Autonomous Unmanned Systems. :15.PDF icon MP-IST-166-04.pdf (428.26 KB)
2018 Arthur-Durett K, Carroll TE, Chikkagoudar S.  2018.  Discovering Significant Co-Occurrences to Characterize Network Behaviors. 20th International Conference on Human Computer Interaction (HCII 2018). :609-623.PDF icon 2400_final(1).pdf (174.48 KB)
2017 Macklin T, Mathews J.  2017.  Big Data, Little Security: Addressing Security Issues in your Platform. SPIE Proceedings, Next-Generation Analyst V. :1-10.PDF icon Macklin et al.pdf (4.14 MB)
2017 Harrison A, Raglin A, Livingston M, Brock, Jr. D, Decker J, Perzanowski D, Van Dolson C, Mathews J, Lulush A.  2017.  The Analysis and Prediction of Eye Gaze When Viewing Statistical Graphs. International Conference on Augmented Cognition. :148-165.
2017 Wehner G, Rowell J, Langley J, Mathews J.  2017.  Federated Cybersecurity Policy Arbitration. NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defense and Resilience. :83-85.PDF icon Wehner et al.pdf (525.18 KB)