Item 4 - Intrusion Detection and Prevention Yuh-Jye Lee Dept. of Computer Science and Information Engineering National Taiwan University of Science and.

Slides:



Advertisements
Similar presentations
{ Principal Leadership Evaluation. Research and Development The team: Porter, Murphy, Goldring, Elliott, Polikoff, May, OToole, Cravens Wallace Foundation.
Advertisements

Statistical Analysis at BAE NS Making Statistics Part of Decision Making in an Engineering Organization Card, Domzalski, Davies IEEE Software, May/June.
1.Quality-“a characteristic or attribute of something.” As an attribute of an item, quality refers to measurable characteristics— things we are able to.
Inquiry Team Eydie Wilson, Ph.D. Math Coach November 3, 2009.
ELL Reading Committee 1 School House Road Reading, PA x321 Improving Reading Performance for ABC School District Presented to: ABC.
U.S. Department of Energy Office of Science Advanced Scientific Computing Research Program How to write a good HBCU Proposal George Seweryniak DOE Program.
2008 © ChengXiang Zhai Dragon Star Lecture at Beijing University, June 21-30, Introduction to IR Research ChengXiang Zhai Department of Computer.
Wilber R. Rivas Del Rio High School San Felipe Del Rio CISD Dr. Guofei Gu Director of SUCCESS laboratory Secure Communication and Computer Systems Computer.
NTUST National Taiwan University of Science and Technology 2009 School of Management.
Understanding Practice: Video as a Medium for Reflection & Design Lucy A. Suchman & Randall H. Trigg.
R R R CSE870: Advanced Software Engineering (Cheng): Intro to Software Engineering1 Advanced Software Engineering Dr. Cheng Overview of Software Engineering.
Software Engineering About the Course Software Engineering Qutaibah Malluhi Computer Science and Engineering Department Qatar University.
Department of Computer Science, Tsinghua University Introduction to the PhD Program of the Department of Computer Science and Technology at Tsinghua.
Advanced Computer Networks Fall 2010 Instructor: Haining Wang.
Development and Promotion of the Faculty Teams in the Schools / Departments of Computer Science of the Universities in China Professor Xu Xiaofei School.
seminar on Intrusion detection system
Recovering and Examining Computer Forensic Evidence Noblett, Pollit, & Presley Forensic Science Communications October 2000 (Cited by 13 according to Google.
Learning Sciences and Engineering Professional Master’s Program Ken Koedinger Vincent Aleven Albert Corbett Carolyn Rosé Justine Cassell.
1 NATIONAL TECHNICAL UNIVERSITY OF ATHENS (NTUA) School of Chemical Engineering Unit of Environmental Science and Technology (UEST) Katherine Haralambous.
This presentation contains copyrighted information belonging to Dr. Lesia L. Crumpton-Young All Rights Reserved. No part of this presentation may be reproduced,
S/W Project Management
Deloitte Consulting SCOOPS Session September 2003.
CHAPTER 5 Infrastructure Components PART I. 2 ESGD5125 SEM II 2009/2010 Dr. Samy Abu Naser 2 Learning Objectives: To discuss: The need for SQA procedures.
OHT 16.1 Galin, SQA from theory to implementation © Pearson Education Limited 2004 The objectives of training and certification The training and certification.
Effective Use of Instructional Time Jane A. Stallings Stephanie L. Knight Texas A&M University.
Sub-theme Three The Self-Assessment Process and Embedding QA into the Life of an Institution by Terry Miosi, Ph.D. UAE Qualification Framework Project.
11 National Kaohsiung First University of S&T ( First Tech ) Department of Construction Engineering February, 2015.
Designing and implementing of the NQF Tempus Project N° TEMPUS-2008-SE-SMHES ( )
Industrial Engineering Roles In Industry
Food Safety Professional Development for Early Childhood Educators Evaluation Plan.
Management information systems. Management information systems, and shortened (in English: MIS), is a type of information technology and computer is.
Learning by Doing (LBD) based Course Content Development (in Areas of CS and ECE) International Institute of Information Technology Hyderabad, India 1.
National Chiao Tung University EECS International Graduate Program Engineer Your Future for Global Technology.
Staff Development Approaches at The University of Georgia: Philosophy, Models, and Financial Support University of Georgia Institute of Higher Education.
頁:頁: National Kaohsiung First University of Science and Technology, Taiwan, R.O.C. 1 Introduction to Fall 2005 「 Industry Research Master Degree Program.
Prepared by the (Institute of Industrial Engineers – Industry Advisory Board)
{ Principal Leadership Evaluation. The VAL-ED Vision… The construction of valid, reliable, unbiased, accurate, and useful reporting of results Summative.
Automated Assistant for Crisis Management Reflective Agent with Distributed Adaptive Reasoning RADAR.
Deloitte Consulting LLP SCOOPS Session September 2004.
Advanced Systems and Network Security Fall 2015 Instructor: Kun Sun, Ph.D.
Short characteristic of teachers training courses Valentyna Radkevych Institute of vocational education and training of National academy of pedagogical.
Component 6 - Health Management Information Systems Unit 1-2 What is Health Informatics?
Chapter 6: THE EIGHT STEP PROCESS FOCUS: This chapter provides a description of the application of customer-driven project management.
Advanced Computer and Network Security Fall 2014 Instructor: Haining Wang.
Planning for School Implementation. Choice Programs Requires both district and school level coordination roles The district office establishes guidelines,
PMC xx/xxxx Project Title & Project Code Presenter:
Carnegie Mellon School of Computer Science Language Technologies Institute CMU Team-1 in TDT 2004 Workshop 1 CMU TEAM-A in TDT 2004 Topic Tracking Yiming.
Artificial Intelligence: Research and Collaborative Possibilities a presentation by: Dr. Ernest L. McDuffie, Assistant Professor Department of Computer.
Proposal Writing. # 1:The title Choose a title that conveys information about your project. Avoid acronyms that have negative connotations. Make it Brief.
Preparing for the Title III Part F STEM Competition Alliance of Hispanic Serving Institutions Educators Grantsmanship Institute March 20, 2016.
2007. Faculty of Education ► Staff 300 (incl.100 in Teacher training school) ► 20 professorships ► 80 lecturers ► 9 senior assistants ► 12 assistants.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
AEA Coffee Break Webinar Series: Graduate and Certificate Programs in Evaluation Evaluation, Assessment, & Policy Connections (EvAP) School of Education,
Marco Vieira University of Coimbra Naples, 20th December 2011.
FNA/Spring CENG 562 – Machine Learning. FNA/Spring Contact information Instructor: Dr. Ferda N. Alpaslan
1 Item 3 - Research and Development of High Security Remote Authentication Technology Item 3 - Research and Development of High Security Remote Authentication.
Outcomes By the end of our sessions, participants will have…  an understanding of how VAL-ED is used as a data point in developing professional development.
1 Item 1 - Security technologies and applications of wireless sensor networks Chin-Laung Lei Department of Electrical Engineering National Taiwan University.
Item 2 - Information Security and Privacy Protection Technology in RFID Applications Nai-Wei Lo Assistant Professor Department of Information Management.
Advanced Software Engineering Dr. Cheng
Department of Construction Engineering
INDUSTRIAL ROBOTICS PROGRAMME White Paper Presentation Programme Manager:
Postgraduate Research in Edinburgh
Change to university degree accreditation incorporating employability:
International Collaboration Project on Information Security
Information Technology (IT)
Deloitte Consulting LLP SCOOPS Session
Identifying Slow HTTP DoS/DDoS Attacks against Web Servers DEPARTMENT ANDDepartment of Computer Science & Information SPECIALIZATIONTechnology, University.
Data-Driven Decision-Making
Jana Diesner, PhD Associate Professor, UIUC
Presentation transcript:

Item 4 - Intrusion Detection and Prevention Yuh-Jye Lee Dept. of Computer Science and Information Engineering National Taiwan University of Science and Technology International Collaboration Project on Information Security

2 Goals of the Project  Bring rich research results into local communities and stimulate further research in related fields  Our target cooperation is the Center for Automated Learning and Discovery (CALD) in Carnegie Mellon University  Implement in a concrete structure and transfer the experience to local industries  Aim to publish research results in top international conferences and journals

3 Major Tasks of International Collaboration  Constructing a honey pot system to acquire typical benchmarks for system training and test  Tracking the intruders to find a complete pattern of attacks  Developing a robust prototype system for intrusion detection and prevention  Designing metric(s) to objectively evaluate an intrusion detection system (IDS)

4 Why Machine Learning Approach and CALD? Machine Learning has been shown an important approach in computer security research Machine Learning has been shown an important approach in computer security research The Journal of Machine Learning Research (JMLR) recently calls for paper of a special issue on Machine Learning for Computer Security The Journal of Machine Learning Research (JMLR) recently calls for paper of a special issue on Machine Learning for Computer Security What is CALD? The Center for Automated Learning and Discovery (CALD) is an academic department within Carnegie Mellon University's School of Computer Science. CALD focuses on research and education in all areas of statistical machine learning. What is CALD? The Center for Automated Learning and Discovery (CALD) is an academic department within Carnegie Mellon University's School of Computer Science. CALD focuses on research and education in all areas of statistical machine learning.

5 Collaboration Scholar Dr. Maxion has a distinctive contribution in Information Security 、 intrusion detection 、 anomaly detection He also published several intrusion detection related conference and journal papers in International Conference on Dependable Systems & Networks (DSN) 、 IEEE Transactions on Reliability 、 International Symposium on Recent Advances in Intrusion Detection (RAID) 、 International Symposium on Fault-Tolerant Computing Dr. Maxion important projects in IDS: Constellation: Scalable Metrology to Support Theory and Practice of Anomalous-Event Detection Profiler-2000: The objective of the Profiler-2000 project is to improve detection performance by: Developing a basic science of profiling, Developing a diverse suite of detectors, Providing custom, calibrated test beds, Providing statistically and methodologically rigorous assessment procedures.

6 Collaboration Scholar There still are many outstanding researchers in Information Security as well as Machine Learning areas in CALD There still are many outstanding researchers in Information Security as well as Machine Learning areas in CALD Dr. Tom Mitchell Fredkin Professor of AI and Learning Director, Center for Automated Learning and Discovery School of Computer Science Carnegie Mellon University Recent Research (Selected) -"Bayesian Network Learning with Parameter Constraints," R.S.Bayesian Network Learning with Parameter Constraints Niculescu, T.M. Mitchell, R.B. Rao, Journal of Machine Learning Research, to appear 2006 Dr. Yiming Yang Professor of Language Technologies Institute and Center for Automated Learning and Discovery at the School of Computer Science of Carnegie Mellon University Recent Research (Selected) -Yiming Yang, Shinjae Yoo, Jian Zhang and Bryan Kisiel. Robustness of Adaptive Filtering Methods in a Cross- benchmark Evaluation. In the 28th Annual International ACM SIGIR Conference (SIGIR 2005), Brazil, 2005

7 Manpower & Budget Position Title Projected Number Professor6 Research Assistant 1 Ph.D Student 2 Master Student 6 Total manpower for the first year is 16 researchers

8 Team Members Functional Position NameAffiliation Professional Title Project Leader Hahn-Ming Lee Dept. of Computer Science and Information Engineering (CSIE), National Taiwan University of Science and Technology (NTUST) Professor Project Co-Leader Yuh-Jye Lee Dept. of CSIE, NTUST Assistant Professor Project Co-Leader Cheng-Seen Ho Hwa Hsia Institute of Technology Principal Associate Project Leader Yuan-Cheng Lai Dept. of Information Management, NTUST Associate Professor Associate Project Leader Hsing-Kuo Pao Dept. of CSIE, NTUST Assistant Professor Associate Project Leader Yi-Leh Wu Dept. of CSIE, NTUST Assistant Professor

9 Team Members (Cont.) Functional Position NameAffiliation Professional Title Full-time Research Assistant (Master Degree) One person TBD Part Time Research Assistant (Ph D. Student) Two persons TBD Part Time Research Assistant (Master Student) Six persons TBD

10 Budget Expense for the First Year (unit : thousands in NT dollar ) Budget Expense for the First Year (unit : thousands in NT dollar ) Item List Budget Amount Percentage Personnel Expense 2,377, % Travel Expense ( Int ’ l Conference, etc ) 400,0008.5% International Collaboration Expense (8 man-month) 719, % Operation Expense 725, % Equipment Expense 500, % Overhead377,8008% Total Amount 5,100,000

11 Key Performance Indicators for Expected Outcomes and Review Points Research Result Technical Report 1 International Conference Paper 1 Build the kernel of intrusion detection system Construct a honey pot to collect data and to analyze the behavior of intrudersNo.Date Description of Check Point 195/09 Construction of a Honey Pot to collect hackers’ behavior 295/12 Collection of Intrusion related data for future evaluation, and development of statistic- based IDS techniques

12 Proposed Project Schedule Schedule : Report generated 1. Identify and select the research topics XXXX1XX 2. Collect and analyze related research papers and prototypes XXXXX X2 + 3.Build research environment and learn necessary skills XXXX 4.Send researchers to work with CMU scholars on site XXX3+ 5. Construct honey pot system, and IDS kernel technology XXX4+ Work Complete Percentage( % ) 40 % 80 % 100 %

13 Thank you! Q&A