International Collaboration Project on Information Security

Slides:



Advertisements
Similar presentations
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Advertisements

Chapter 19: Network Management Business Data Communications, 4e.
Software Engineering About the Course Software Engineering Qutaibah Malluhi Computer Science and Engineering Department Qatar University.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Considerations in Adaptive Middleware Security and Mobile Agents Ajanta – Mobile Agent’s research project papers (
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
Cloud Usability Framework
A Robust Health Data Infrastructure P. Jon White, MD Director, Health IT Agency for Healthcare Research and Quality
IMPACT of the GLOBALIZATION PHENOMENA on HIGHER EDUCATION Ljerka Luić b4b, Zagreb, Croatia
Tackling the Policy Challenges of Health Information Exchange Carol Diamond, MD, MPH Managing Director, Markle Foundation.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Academic Computing Daniella Meeker, PhD Director, Clinical Research Informatics SC-CTSI Assistant Professor of Preventive Medicine and Pediatrics.
INFSO-SSA International Collaboration to Extend and Advance Grid Education ICEAGE Forum Meeting at EGEE Conference, Geneva Malcolm Atkinson & David.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
IHSN International Household Survey Network Strategy for the Development of Data: Improve the Availability, Accessibility, and Quality of Survey Data Mahesh.
m-Privacy for Collaborative Data Publishing
RELATIONAL FAULT TOLERANT INTERFACE TO HETEROGENEOUS DISTRIBUTED DATABASES Prof. Osama Abulnaja Afraa Khalifah
How to start research V. Jayalakshmi. Why do we research? – To solve a problem – To satisfy an itch – To gain more market share/ Develop and improve –
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Service - Oriented Middleware for Distributed Data Mining on the Grid ,劉妘鑏 Antonio C., Domenico T., and Paolo T. Journal of Parallel and Distributed.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Distributed System Concepts and Architectures 2.3 Services Fall 2011 Student: Fan Bai
Frankfurt (Germany), 6-9 June 2011 SmartLife Guillaume & SmartLife Core Group – France – S1 – Paper SmartLife initiative in Focus.
Azam Supervisor : Prof. Raj Jain
WRIGHT STATE UNIVERSITY College of Education and Human Services Integrating Technology Into Foundations and Methods Courses.
m-Privacy for Collaborative Data Publishing
SSQSA present and future Gordana Rakić, Zoran Budimac Department of Mathematics and Informatics Faculty of Sciences University of Novi Sad
STRATEGY FOR DEVELOPMENT OF ISIS AND IT STRATEGY IN THE NSI-BULGARIA Main principles, components, requirements.
THE IMPACT OF OSPF ROUTING ON MILITARY MANETS BY ROCCO LUPOI UNDER THE GUIDANCE OF DR. GRANT WIGLEY THESIS - BACHELOR OF COMPUTER SCIENCE (HONOURS) - LHIS.
WP5: Dynamic Analysis Presented by Pierpaolo Degano Dipartimento di Informatica Università di Pisa at the Final review of DEGAS, 6 April 2005.
Improving System Availability in Distributed Environments Sam Malek with Marija Mikic-Rakic Nels.
Office of the National Coordinator for Health Information Technology ONC Update for HITSP Board U.S. Department of Health and Human Services John W. Loonsk,
Item 4 - Intrusion Detection and Prevention Yuh-Jye Lee Dept. of Computer Science and Information Engineering National Taiwan University of Science and.
1 Item 3 - Research and Development of High Security Remote Authentication Technology Item 3 - Research and Development of High Security Remote Authentication.
1 Item 1 - Security technologies and applications of wireless sensor networks Chin-Laung Lei Department of Electrical Engineering National Taiwan University.
Item 2 - Information Security and Privacy Protection Technology in RFID Applications Nai-Wei Lo Assistant Professor Department of Information Management.
Oracle Enterprise Planning and Budgeting May 21, 2004 Mike Hipps Principal Sales Consultant North American Sales © 2003, 2004 Oracle Corporation. All.
Title of Full Proposal Name of Corresponding PI, Institution
Application Of Cloud Computing On Cooperative Supply Chain Management
ICT Net Innovation Initiative
Chapter 19: Network Management
Business process management (BPM)
Updating the Value Proposition:
ISO Smart and Sustainable Cities developments
Analysis of Computing Options at ISU
TRUST Area 3 Overview: Privacy, Usability, & Social Impact
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Business process management (BPM)
Algorithms for Big Data Delivery over the Internet of Things
Title of Full Proposal Name of Corresponding PI, Institution
Model-Driven Analysis Frameworks for Embedded Systems
Internet-based monitoring and control of embedded systems
Karen Bartleson, President, IEEE Standards Association
C.U.SHAH COLLEGE OF ENG. & TECH.
Cloud Security 李芮,蒋希坤,崔男 2018年4月.
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Treasury Performance Measuring and Monitoring in Kyrgyz Republic
Towards Excellence in Research: Achievements and Visions of
ISO Smart and Sustainable Cities developments
LESSON 3 Job Analysis Dr. Salim Al-Shukaili.
GRIF DEX is an international decentralized exchange, a trading platform where you can buy and sell coins, tokens and fiat currency. An exchange will conform.
Beyond FTP & hard drives: Accelerating LAN file transfers
Joint Application Development (JAD)
Title of Full Proposal Name of Corresponding PI, Institution
ONC Update for HITSP Board
Title of Full Proposal Name of Corresponding PI, Institution
The Role of Metadata in Census Data Dissemination
Presentation transcript:

International Collaboration Project on Information Security Item 6 - Realization of High Speed IDS Expert System and Privacy-preserving Information Protection Management System Yeali S. Sun (孫雅麗) Department of Information Management National Taiwan University

Outline Goals of the Project Major tasks and expected outcomes from International Collaboration Manpower and budget expense Key performance indicators and review points

Realization of High Speed IDS Expert System Motivation The methods of IDS are ad hoc, and generally independently to each other, that are ideally suited for expert system approach. However, expert system approach is aiming for problem solving, not for efficient processing. There is a need to realize IDS expert system for high speed network environment. Network forensics Software-based IDS System For higher-speed links (gigabit and higher) hardware accelerators must be integrated into IDS systems, to process packets in real-time (or near real-time). Hardware-software co-design IDS.

Realization of High Speed IDS Expert System Objectives Collect known IDS methods to design IDS expert system. Design a method and system to translate IDS expert system into intermediate representation Design a pseudo machine with built-in stateful protocols (as finite state machines) to efficiently execute the intermediate result Realize the pseudo machine in an embedded system utilizing special hardware

Privacy-preserving information security and risk management Motivation Information privacy relates to an individual's right to determine how, when, and to what extent personal information will be released to another person or organization. trade-off between the need for data sharing and distribution, and the right of individuals to regulate the release of their personal information. The impacts are at all levels from personal to enterprise/institutional to national. The risks involved need to be analyzed and corresponding risk management models developed. Relevant research topics include access control, information filtering and transparency, data mining, data integration, data authentication, and models for anonymity and unobservability and so on.

Privacy-preserving information security and risk management: Key technical strategies Selective Revelation a method for minimizing exposure of individual information while enabling continuous analysis of potentially interconnected data Strong Audit a tamper-resistant method that identifies where data goes and who has seen it Rule Processing Technologies that guide how data from multiple sources with potentially different privacy constraints can be processed

Privacy-preserving information security and risk management: Objectives Theoretical Privacy-preserving models, encryption techniques Risk analysis and risk management model Centralized multi-layered access/permission control model Extended to distributed multi-layered access/permission control Target application context In use in health care / home care industries, business enterprises, e-commerce, and national security System System architecture (enterprise architecture) and middleware development Software system implementation, efficient algorithms development .net and Java programming

International Collaborations Realization of High Speed IDS Expert System With Professor Hui Zhang of CMU UCB Ph.D.(1996), ACM Fellow(2005) Privacy-preserving Information Protection Management System With Prof Doug Tygar of UCB Planned Activities (2006) Personnel Exchange Ph.D. students will stay at collaborators’ labs PI Visiting

Manpower Functional Position Name Affiliation Title PI Yeali S. Sun Dept. of  Information Management National Taiwan University Professor CO-PI T-C Chou Meng Chang Chen Institute of Information Science Academia Sinica Associate Research Fellow Full-time Research Assistant (Master Degree Two persons TBD Part-time Research Assistant (Ph.D Student) Five persons Part-time Research Assistant ( Master Student)

Budget Expense for the First Year Item List Budget Amount Percentage 1. Personnel Expense 3,315,000 70.2% 2. Equipment Expense 250,000 5.3% 3. Travel Expense (International Conference, etc) 240,000 5.1% 4. International Collaboration Expense 733,800 15.5% 5. Operation Expense 183,400 3.9% 6. Overhead 377,800 8% Total Amount 5,100,000

Review Points of the first year Check No. Period Descriptions 1 6th month Implementation of the interpreter to generate automatically object code for FSM . 2 Complete privacy-preserving information protection models 3 10th month Implementation of flow/connection classifiers and state manager 4 Complete centralized multi-layered access/permission control model 6 12th month Prototype system and algorithms development of risk management 7 Submit papers to related international conferences

Thank you! Q&A