The School of Electrical Engineering and Computer Science (EECS) CS/ECE Introduction to Network Security Dr. Attila Altay Yavuz Big Picture and Organization.

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
1 i206: Distributed Computing Applications & Infrastructure 2012
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
FIT5037 Advanced Network Security --- Modern Computing and Security --- Lecture 1.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Introduction to Network Security Dr. Attila Altay Yavuz Big Picture and Organization.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Need for Privacy Enhancing Technologies 1 What is challenging about standard encryption?
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
CSCE 727 Information Warfare
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
1 ECE 156 Computer Network Architecture Professor Krish Chakrabarty Department of Electrical and Computer Engineering Fall 2006.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Advanced Network Security Dr. Attila Altay Yavuz Big Picture and Organization Advanced.
Data and Applications Security Developments and Directions Guest Lecture Dr. Kevin Hamlen Given in February 2012.
Information Security Analytics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course.
Cryptography and Network Security (CS435) Part One (Introduction)
Proposal for Term Project Information Security, Fall 2014 J. H. Wang Sep. 25, 2014.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Applied Cryptography Dr. Attila Altay Yavuz Big Picture and Organization Applied.
CSCE 824 Secure (and Distributed) Database Management Systems FarkasCSCE
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Advanced Network Security Dr. Attila Altay Yavuz Topic 1.0 Big Picture, Vision.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Koji OKAMURA Cybersecurity Center, Kyushu University Cybersecurity Education.
Security of the Internet of Things: perspectives and challenges
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
Proposal for Term Project Information Security, Fall 2013 J. H. Wang Nov. 5, 2013.
Big Picture and Organization
CS/ECE 578 Cyber-Security Dr. Attila Altay Yavuz
Principles of Computer Security
CS/ECE Applied Cryptography Dr. Attila Altay Yavuz
사물네트워크 시스템 보안 - Focused on Advanced Cryptography-
Data & Network Security
Data and Applications Security Developments and Directions
CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Course Overview and Organization
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Introduction to Course
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

The School of Electrical Engineering and Computer Science (EECS) CS/ECE Introduction to Network Security Dr. Attila Altay Yavuz Big Picture and Organization Introduction to Network Security Dr. Attila Altay Yavuz1Spring 2016

OSU EECS Dr. Attila Altay Yavuz 2 Outline (current lecture) Self-introduction Big Picture –Grand-vision, problems and challenges Course Objectives ( overview) –Touching important problems and tools (name & functionality) –Going over Syllabus Further info about this course –Grading –Requirements –Position of this course in “OSU-Security Landscape”

OSU EECS Dr. Attila Altay Yavuz 3 Self-Intro Assistant Professor, EECS at Oregon State University Adjunct Faculty, University of Pittsburgh (Jan now) Research Scientist, Bosch Research Center (Dec Aug. 2014) –Develop security and privacy research programs –Privacy-preserving Big Data Technologies (~1M) –Secure Internet of Things and Systems (~250K) Ph.D., North Carolina State University (Jan Aug. 2011) –Compromise Resilient and Compact Crypto for Digital Forensics MS, Bogazici University ( ) –Efficient Crypto Mechanisms for Military Ad-hoc Networks

OSU EECS Dr. Attila Altay Yavuz 4 Self-Intro (Cont’) Research Interests: Applied cryptography, network security, privacy Academic Collaborations: Upitt, UNC, UCI, Purdue-CIT, CMU Industry Collaborations: Bosch, Oracle, Cisco, SEI-CMU, ISE Some Impact Examples: ECU Privacy-Preserving Medical Databases (HCTM, 2016) Secure Intra-car Networks (OEMs, 2018)

OSU EECS Medium term Long term Near term Big Picture: Technology Trends & Vision Smart-infrastructures and distributed systems Big Data Technologies Cloud-based Applications Smart Home Inter vehicular networks Smart-grid Smart-city Digitalized Healthcare Inf. Sys. 5

Challenges of Security and Privacy in IoTS Requirements and Challenges Cloud-based Services Smart-home and WSNs Heterogeneity Vehicular networks (e.g., Car-2-X) High Performance/Scalability Data Availability Interconnectivity 6 SOMETHING MISSING?

Need for Privacy Enhancing Technologies 7 Privacy Breaches: Big Data and IoTS

OSU EECS Cyber Physical Systems - Vulnerabilities Reliable Cyber-Physical Systems (e.g., smart-grid) are vital – Susceptible: Northeast blackout (2003), 50 million people, $10 billion cost – Attacks: False data injection [Yao CCS09’], over 200 cyber-attacks in 2013 Vulnerability: Commands and measurements are not authenticated Requirements for a security method – Real-time  Extremely fast processing (a few ms) – Limited bandwidth  Compact – Several components  Scalability Limitations of Existing Methods – PKC is not yet feasible (computation, storage, tag size) – Symmetric crypto is not scalable (key management ) 8

OSU EECS Security Challenges for Smart-Infrastructures (II) 9 Internet ECU Vulnerability: Commands and measurements are not authenticated Security for Inter-car Networks – Manipulate direction/velocity, crashes Security for Intra-car Networks – Large attack surface [Usenix '11] – ECUs of break/acceleration, airbag Challenges – Strict safety requirements – Limited bandwidth, real-time processing The state-of-art cannot address (as discussed) Inter-car and Intra-car Networks

OSU EECS Heterogeneity: Resource-Constraints vs. Efficiency Requirements –Designing efficient cryptographic primitives for resource-constrained systems –Code-size, battery issues, transmission range, cost –Specialized Authentication and Integrity Methods Scalability: Key Distribution vs. Efficiency Requirements –Symmetric crypto, O(n^2) key distribution, very fast but not scalable –Public key, how to distribute certificates? –Advanced Key Establishment, Distribution and Management Methods Outsourcing vs. Privacy/Integrity Dilemma –How to operate on the encrypted data efficiently? How to ensure the integrity? –Privacy Enhancing Technologies: Searchable Encryption, Oblivious RAM, Differential Privacy, Secure MPC… Interconnectivity and increased attack surface –Extra tools, primitives, and all above an integrated manner Resiliency, fault-tolerance, compromise-resiliency, and more… 10 Some Challenges – About Landspace

OSU EECS Pillars and Key Cyber Security Approaches Pillar I-II: Authentication and Integrity – Broadcast Authentication: Internet, wireless net., multi-media, … Vehicular networks, power-grid, smart-grid, drones… – Specialized Signatures: Real-time, compromise-resilient, hybrid, … Pillar III: Privacy (Confidentiality) and Functionality – Privacy Enhancing Technologies – Cloud computing and data outsourcing: SE, DF, MPC, ORAM, PoR – Privacy-preserving data mining Pillar IV: Availability and Resiliency – Denial of Service (Client-server application) – Fault-tolerance via redundancy and secret sharing, effective storage Packet loss (any comm. medium) Active adversaries – 11

OSU EECS Dr. Attila Altay Yavuz 12 Outline (current lecture) Self-introduction Big Picture –Grand-vision, problems and challenges Course Objectives ( overview) –Touching important problems and tools (name & functionality) –Going over Syllabus (from webpage) Further info about this course –Grading –Requirements –Position of this course in “OSU-Security Landscape”

OSU EECS High-Level Objectives Create foundations/background to tackle these challenges! Cryptographic primitives and Net. Sec. foundations: –Essential cryptographic building blocks –Crypto primitives –Their properties and use Basic Service: Authentication –Primitives and protocols Key Management and Establishment Protocols Net. Sec. Protocols and some Adv. Topics

OSU EECS Dr. Attila Altay Yavuz 14 Outline (current lecture) Self-introduction Big Picture –Grand-vision, problems and challenges Course Objectives ( overview) –Touching important problems and tools (name & functionality) –Going over Syllabus Further info about this course –Grading –Requirements –Position of this course in “OSU-Security Landscape”

OSU EECS CS 372 is required. A basic understanding of security mechanisms is good. Homeworks, %40 (3 or 4 HWs) Midterm %25, Final %30 Class attendance, participation %5 HWs are non-trivial and research-oriented (10-14 days, plenty of time!) Cover a concept related to class topics as a complementary aspect –E.g., Block ciphers and DES will be covered in-class, AES will be explored in HW Research and exploration of concepts –Research problem X is vital and addresses Y, explain the most recent methods in your words by reading and distilling respected conference/journal papers… –Compare and contrast protocol X and Y w.r.t. parameters A,B,C… –No extensive programming assignments are considered for now (not hands-on focused) Traditional questions involving design and explanations from class material Design, analysis and construction of primitives/protocols (not implement them) –Crypto architecture, cryptographic engineer or researcher Midterm and final will capture both course material and HWs 15 Requirements and Grading