Center for Cyber Warfare

Slides:



Advertisements
Similar presentations
CS 443 Advanced OS Fabián E. Bustamante, Spring 2005 Resource Containers: A new Facility for Resource Management in Server Systems G. Banga, P. Druschel,
Advertisements

Module 5: Configuring Access to Internal Resources.
Network Innovation using OpenFlow: A Survey
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
Modern Distributed Systems Design – Security and High Availability 1.Measuring Availability 2.Highly Available Data Management 3.Redundant System Design.
1 K. Salah Module 4.3: Repeaters, Bridges, & Switches Repeater Hub NIC Bridges Switches VLANs GbE.
Design and Implementation of SIP-aware DDoS Attack Detection System.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
Research on cloud computing application in the peer-to-peer based video-on-demand systems Speaker : 吳靖緯 MA0G rd International Workshop.
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
The Design Discipline.
Website on Computer Security By: Brittany Freeman.
GrIDS -- A Graph Based Intrusion Detection System For Large Networks Paper by S. Staniford-Chen et. al.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
Hitchhiker‘s guide to the brave new world GOTU by Eggenberger Christian.
Computer Network Forensics Lecture 6 – Intrusion Detection © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering,
CSCI 6231 – Final Lecture Additional Resources and Topics.
Stephan Bayer September 9, 2004 INLS 187. What is it? War Driving Software – WarDriving v. The benign act of locating and logging wireless access points.
1 These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 5/e and are provided with permission by.
Packet Capture and Analysis: An Introduction to Wireshark 1.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
GEO PLACES EXPLORER PRESENTED BY KHUSHBOO BAGHADIYA SUMANA VENKATESH.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.
Road Information System / Road Data Bank 10 April 2013 Lars Bergman M. Sc. In Civil Engineering Long Term Planning Swedish Transport Administration.
CISC 849 : Applications in Fintech Jin Gu Dept of Computer & Information Sciences University of Delaware Cyber-security & Finance.
Design Lines for a Long Term Competitive IDS Erwan Lemonnier KTH-IT / Defcom.
Network Components and terms. Hub is a device for connection multiple ethernet devices together and making then act as a single network segment.
Uniform Resource Locator URL protocol URL host Path to file Every single website on the Internet has its own unique.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ITMT 1371 – Window 7 Configuration 1 ITMT Windows 7 Configuration Chapter 8 – Managing and Monitoring Windows 7 Performance.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Despite of spending high on digital information security, organizations still remain exposed to external threats. However, data center providers are helping.
Some Great Open Source Intrusion Detection Systems (IDSs)
Glencoe Introduction to Multimedia Chapter 2 Multimedia Online 1 Internet A huge network that connects computers all over the world. Show Definition.
1 The XMSF Profile Overlay to the FEDEP Dr. Katherine L. Morse, SAIC Mr. Robert Lutz, JHU APL
Introduction: Internet of Things (IoT) by Tom Plummer
C IBM Security QRadar SIEM V7.2.6 Associate Analyst
Web Routing Designing an Interface
Automatic Network Protocol Analysis
Products/Solutions/Expertise of C-DAC Mumbai in Smart City Domain
Database System Concepts and Architecture
Browsing and Searching the Web
Study course: “Computing clusters, grids and clouds” Andrey Y. Shevel
Time-Based Modeling of Ship Ballasting for Increased Performance
Lesson 2-9 AP Computer Science Principles
practice-questions.html If you Are Thinking about your dumps? Introduction:
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
Cyber Security of SCADA Systems
CYB 100 Become Exceptional/ newtonhelp.com. CYB 100 All Assignments For more course tutorials visit uophelp.com is now newtonhelp.com
Electronic Chart System (ECS)
Internet of Things (IoT)
AKAMAI INTELLIGENT PLATFORM™
What is a network? A network consists of two or more entities, or objects, sharing resources and information. In a basic sense, sharing (giving or getting)
Communication Networks NETW 501 Tutorial 2
IS4680 Security Auditing for Compliance
Second Year Projects: Voyages of Exploration
Taxpayer Access Point (TAP) and Audit Timekeeping Project Closeout
SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke
Starting Design: Logical Architecture and UML Package Diagrams
Network Traffic and Cybersecurity
Network Architecture By Dr. Shadi Masadeh 1.
Reverse engineering through full system simulations
USN Introduction Computer Engineering Sejin Oh.
Protection Mechanisms in Security Management
Stable connection More secure More vulnerable to hacking Cheap set up costs Generally will have a good quality signal The connection is not as stable.
Function of Operating Systems
Presentation transcript:

Center for Cyber Warfare Engineering Enclave for Maritime Security A physical voyage control network and key components (ICS) deployed on USN, USNS, and civilian ships Principle Questions: How do the components work and what protocols do they use? What data do they store and record How and where? What happens when bad inputs are applied? What can be done to close vulnerabilities? Pursuing multiple aspects of a larger project involving JHU-APL and other entities Introduction Background Modeling Detection Conclusions

EEMS Progress To-Date Mapping the network and connections Metering and tapping the flows

EEMS Security Analysis: Network Exploration and Mapping Source: Furuno

EEMS Security Analysis: Research Options Vulnerability analysis of Weatherfax Hack a web server set in an ICS Software reverse engineering of VDR Big data exploration and analysis of AIS traffic + VDR-retained data Voyage Network traffic analysis: Network anomaly detection Component Analysis, Hardware RE, and Simulation VHF bridge-to-bridge, GPS, NAVTEX, etc.