School of Electrical and Computer Engineering

Slides:



Advertisements
Similar presentations
Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Advertisements

ITEC 6324 – Assignment Seven IEM Baseline Activity / Tool (Netstumbler, Kismet, Airopeek & AirSnort. Name: Victor Wong Instructor: Dr Crowley.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Information Security and Assurance Center 1 Address: 615 McCallie Avenue Phone: Chattanooga TN 37403
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
1 MD5 Cracking One way hash. Used in online passwords and file verification.
WiMAX Introduction Worldwide Interoperability for Microwave Access
Wilber R. Rivas Del Rio High School San Felipe Del Rio CISD Dr. Guofei Gu Director of SUCCESS laboratory Secure Communication and Computer Systems Computer.
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Eileen Kraemer Professor and Head, Computer Science The University of Georgia.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang Fall 2011.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Lecture 24 Wireless Network Security modified from slides of Lawrie Brown.
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
ADVANCE MOBILE TECHNOLOGY & NETWORKING Course Content.
Mark W. Propst Scientific Research Corporation.  Attack Motivations  Vulnerability Classification  Traffic Pattern Analysis  Testing Barriers  Concluding.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Dr. Amir Qayyum Affiliation &  Professor and Dean Faculty of Engineering, M. A. Jinnah University. Islamabad. ( Domain of Expertise:
Chapter Overview Network Communications.
SMUCSE 8344 Term Paper Topics (Always Incomplete).
Communication Research Labs Sweden AB Introduction to Wireless communication and WLAN.
Security and Resilience in Wireless Communications Federal University of Paraná, Brazil Prof. Michele Nogueira Dublin, Ireland February.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University.
Chapter 7- Mobile and Wi-Fi Networks Taking signals on and off the air Connections to other networks Need to manage spectrum Managing and billing for services.
HYBRID ROUTING PROTOCOL FOR VANET
Networks and Protocols CE Week 5b. WAN’s, Frame Relay, DSL, Cable.
 Louena L. Manluctao  East Early College High School  Houston Independent School District  Dr. Guofei Gu  Assistant Professor  Department of Computer.
Sponsored by the National Science Foundation1 Experiment 1 WiMAX broadcasting WiMA X Communication from the WiMAX interface Devices may experience data.
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Practically Useful Network Security Chin-Tser Huang University of South Carolina.
A Passive Approach to Rogue Access Point Detection IEEE GLOBECOM 2007 Lanier Watkins Raheem Beyah Cherita Corbett 김진석.
An Efficient Wireless Mesh Network A New Architecture 指導教授:許子衡 教授 學生:王志嘉.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
A Study of Secure Communications in WiFi Networks Bumjo Park 1 and Namgi Kim 11 1 Dept. Of Computer Science, Kyonggi Univ. San 94-1, Iui, Yeongtong, Suwon,
1 Company Confidential Fluke Networks OptiView Wireless Network Analyzer Bringing the power of OptiView to Wireless LANS.
CU-Boulder Timothy X Brown Interdisciplinary Telecommunications Electrical and Computer Engineering University of Colorado Presented to L3 Comcept at the.
The Tech that supports the Net Net Tech for CBIS.
Access Point Fall Semester, School of Computer Science & Engineering, Seoul National University. Professor Yanghee Choi Student : MyungHoon Kim.
1 Host versus Network Security Steven M. Bellovin
Network Know How Better Living through Chemistry.
A Protocol for Tracking Mobile Targets using Sensor Networks H. Yang and B. Sikdar Department of Electrical, Computer and Systems Engineering Rensselaer.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
PROWIND (Positioning Relay over Wirelessly Networked Devices) Team Members: Alexander Smithson, Dian Ding, Yeh Cheng Yuan Graduate Advisor: Eric Liao Faculty.
Standard: Security Methods Jason Gibson TCM471 Professor Crum.
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Understand Wireless Security LESSON Security Fundamentals.
Faculty of Engineering and Built Environment Department of Electrical Engineering 1 Faculty of Engineering and the Built Environment Department of Mechanical.
QM/BUPT Joint Programme
ABSTRACT Problem Statement: The main aim of this thesis work is to investigate the performance of real-time voice traffic in IP networks and MPLS networks.
Project JXTA By Jude Mercado.
or call for office visit Chapter 6 - IPsec (IP Secure)
13-May-2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Some MAC Requirements for Neighborhood Area.
Prof. Maria Papadopouli
Yan Chen 陈焰 Assistant Professor, Department of Electrical Engineering and Computer Science, Northwestern University Education Univ. of California at Berkeley,
Mobile ad hoc networking: imperatives and challenges
VoIP Final Report Proposal Spring 2004
Quality of Service For Mobile IP.
MESSAGE PROJECT CONTRIBUTION
CS 336/536: Computer Network Security Fall 2015 Nitesh Saxena
Jirawat Thaenthong, PhD
Intrusion Detection system
Network Traffic and Cybersecurity
EEL 6935 Wireless Ad Hoc Networks
Developing Vehicular Data Cloud Services in the IoT Environment
Providing Teleworker Services
Chapter 8 – Data switching and routing
Presentation transcript:

School of Electrical and Computer Engineering Georgia Institute of Technology May 13, 2010

People Prof. John A. Copeland - Weitneur Chair Prof. Henry Owen - ECE Prof. George Riley - ECE Prof. Raheem Beyah - GSU, Georgia Tech Adjunct Prof. Dr. Yusun Chang - Post Doc. Researcher Prof. Seokjoo Shin - visiting professor Prof. Hyoung-Kee Choi - visiting professor, GT Adjunct 10 Graduate Students

Research Areas Analysis of Network Traffic To detect compromised computers, bot nets, … To predict host vulnerability (probability of compromise) To monitor network operations (SA/Cisco remote headend) To determine packet error statistics (Uverse study) Wireless Networks Ad Hoc WiFi and WiMAX - security and efficiency Vehicular Network (VANET) protocols WiFi Access + WiMAX Backbone with end-to-end QoS Rogue Access Point Detection Sensor Networks - encryption and authentication Smartphone security

Heterogeneous Wireless Network WiMAX, 802.16, mesh backbone with DiffServ. WiFi, 802.11e, access network with Classified Service QOS

Measured Statistical Distribution of Uverse Packet Errors Distribution of burst errors (in terms of packets) at two sites.

Measured Statistical Distribution of Uverse Packet Errors Distribution of maximum jitter (in terms of packets) at two sites.

Network Security Education Annual ECE6612 Computer Network Security Contest Teams Harden Their Computer, then Hack into Other Teams'

For more information: John Copeland - jcopeland@ece.gatech.edu 404-894-5177 cell 404-786-5804 http://www.csc.gatech.edu