“Distributed Systems & Networking” Discipline Professor Zahir Tari

Slides:



Advertisements
Similar presentations
Web Content Control Application Providing Secure & Reliable Internet Access December 2010.
Advertisements

ICS 434 Advanced Database Systems
IT Infrastructure for Energy Efficiency in Future Cities: From the Smart Home to the Smart Grid Chief Investigators: CS&IT: Prof. Zahir Tari, Dr Caspar.
Dynamic Task Assignment Load Index for Geographically Distributed Web Services PhD Research Proposal By: Dhiah Al-Shammary Supervised.
Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Department of Mathematics and Computer Science
Interactive Systems Technical Design Seminar work: Web Services Janne Ojanaho.
Reseach in DistriNet (department of computer science, K.U.Leuven) General overview and focus on embedded systems task-force.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
City University London
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
PhD course - Milan, March /06/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science.
Ch 12 Distributed Systems Architectures
Master Course /06/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
Web server security Dr Jim Briggs WEBP security1.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
“Distributed Systems & Networking” Discipline Professor Zahir Tari
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 12 Slide 1 Distributed Systems Design 1.
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
PCM2U Presentation by Paul A Cook IT SERVICES. PCM2U Our History  Our team has been providing complete development and networking solutions for over.
Towards a Distributed, Service-Oriented Control Infrastructure for Smart Grid ASU - Cyber Physical Systems Lab Professor G. Fainekos Presenter: Ramtin.
Security Difficulties of E-Learning in Cloud Computing
Client/Server Architectures
.NET, and Service Gateways Group members: Andre Tran, Priyanka Gangishetty, Irena Mao, Wileen Chiu.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Clinic Security and Policy Enforcement in Windows Server 2008.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
© 2012 IBM Corporation IBM Israel Software Lab (ILSL( Daniel Yellin, Director March 2013.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Computation Offloading
Presentation title SUB TITLE HERE Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Dr. Emmanuel Hooper, PhD, PhD,
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 12 Slide 1 Distributed Systems Architectures.
Software-Defined Networks Jennifer Rexford Princeton University.
Networked Application Architecture Design. Application Building Blocks Application Software Data Infrastructure Software Local Area Network Server Desktop.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Logistics and Systems Rabby Q. Lavilles. Supply chain is a system of organizations, people, technology, activities, information and resources involved.
Exploring the Network.
Rapid Development and Flexible Deployment of Adaptive Wireless Sensor Network Applications Chien-Liang Fok, Gruia-Catalin Roman, Chenyang Lu
Mark J. Salamango Chief Pervasive Architect USA TACOM Tel: Fax: Pervasive Computing: Why did the logistics.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department.
Introduction to the Adapter Server Rob Mace June, 2008.
Survival by Defense- Enabling Partha Pal, Franklin Webber, Richard Schantz BBN Technologies LLC Proceedings of the Foundations of Intrusion Tolerant Systems(2003)
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
DISTRIBUTED COMPUTING. Computing? Computing is usually defined as the activity of using and improving computer technology, computer hardware and software.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
Winston H. Wu, Maxim A. Batalin, Lawrence K. Au, Alex A. T. Bui, and William J. Kaiser.
Keith Murphy Supervisor: Dr Caspar Ryan RMIT University – Distributed Systems and Networking Melbourne, AUSTRALIA Keith Murphy1.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Lecture 1: Network Operating Systems (NOS) An Introduction.
DSN & SensorWare Projects Rockwell Science Center –Charles Chien UCLA –Mani Srivastava, Miodrag Potkonjak USC/ISI –Brian Schott, Bob Parker Virginia Tech.
Mobile Analyzer A Distributed Computing Platform Juho Karppinen Helsinki Institute of Physics Technology Program May 23th, 2002 Mobile.
Luigi Cicchese Partner Reply Building a Smarter City.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Introduction to Mobile-Cloud Computing. What is Mobile Cloud Computing? an infrastructure where both the data storage and processing happen outside of.
Clouding with Microsoft Azure
Connected Infrastructure
Enterprise Architectures
CompTIA Security+ Study Guide (SY0-401)
Connected Infrastructure
Introduction to Cloud Computing
CompTIA Security+ Study Guide (SY0-401)
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Mark Quirk Head of Technology Developer & Platform Group
IT Applications with Emerging Techniques: Security Solutions
Presentation transcript:

“Distributed Systems & Networking” Discipline Professor Zahir Tari

DSN staff DSN students team with happy faces! The Team ….

DSN - discipline profile located mainly on (end of corridor) 8 academic staff, 4 post docs, 25 PhD students 4 main areas of focus: networking, distributed systems and games&graphics, mobile computing funding over 4$ million from Australian Research Council (Discovery/Linkage) industry collaboration: Logistics (integrated platforms for trucking tracks in Australia), Security (SCADA), Mobile Platforms (for fire protection)

DSN courses Foundations Distributed Computing Advanced Client/Server Architectures Advanced Data Communication Data Communications Net-Centric Computing WebServers and Web Technology Network Programming Network Security Enterprise Systems Architecture Interactive 3D Graphics and Animation Introduction to Graphics Programming using Java3D Real-Time Rendering and 3D Games Programming Web 3D Technologies Mobile Application Development etc

CYBER SECURITY security of SCADA networks (intrusion detection systems tailored for distributed systems, network traffic analysis to detect “anomalies”) survivability of SCADA operations (by intelligently replicating, migrating.. essential services) scalability of SCADA systems (by reducing huge volume of data) 5 Computer Science (CS&IT) staff 2 Engineering (SECE) staff General attacker threatsCommon criminals Organized crime Regional political activismTerrorist Threats Environmental groups Malicious code attack Disaffected staff Sources of Threats

body sensor networks (BSN) & mobile healthcare data compression, encryption and prioritisation of ECGs remote cardiac monitoring/diagnosis of elderly patients at home, soldiers in battlefield, wellness monitoring ECG based biometric (authentication, integrity of data in BSN) BSN for rehabilitation, sports, orienteering (with GPS). Dr I. Khalil (Leader), Dr R v Schyndel, Dr Fengling, A/Prof G. Fernandez,

Context Aware/Adaptive Mobile Applications Context Awareness Monitor Hardware (e.g. CPU, RAM, Network, Power) Physical Environment (e.g. Position, Light, Sound, Facilities) User Preferences (General or Application specific) Adaptation Object/Code mobility (execute code at most efficient location) Automatic replication/caching (local code and data when efficient to do so) Behavioural adaptation (different functionality in different contexts) MobJeX Middleware Developed at RMIT (With many Honours, Masters, PhD & Summer students involved!) 100+ packages, classes 50,000+ lines of code Automatically adds adaptive capabilities to Java applications via pre-compilation and byte code transformation Provides runtime support for context collection, object mobility, replication and behavioural adaptation Runs on Windows, Linux and Windows Mobile Dr C. Ryan (Leader)

Security biometric security biometric security explore how to accurately identify a person based on his/her biometric features like fingerprint, face, etc. explore how to accurately identify a person based on his/her biometric features like fingerprint, face, etc. explore how to integrate biometrics into mobile devices such as mobile phones, PDAs and smartcards (mobile biometric) explore how to integrate biometrics into mobile devices such as mobile phones, PDAs and smartcards (mobile biometric) intrusion detection intrusion detection hackers can always penetrate network firewalls and modify your program or sensitive data. hackers can always penetrate network firewalls and modify your program or sensitive data. new attacks are occurring everyday. Hard to detect new attacks! new attacks are occurring everyday. Hard to detect new attacks! investigate anomaly based intrusion detection techniques such as machine learning, Hidden Markov Models etc investigate anomaly based intrusion detection techniques such as machine learning, Hidden Markov Models etc Dr Fengling (Leader), A/Prof Bertok, Dr Khalilm, Prof Hu

Web Typically XML over HTTP/s Service Provider A Service Provider B Service Provider C Restaurant Selection Credit Check Route planning Credit card payment performance performance performance … (of SOAP) real-time aspects (scheduling etc.) security (in XML): access control, aggregation or inference, etc. find services (based on specific semantic) verification of communication / negotiation Prof Tari and A/Prof Bertok Web Services

Service-Oriented Architectures (SOA) Security, Monitoring Service implementations CRMERPOTHER Legacy systems Software Services Business Processes Service Consumers Software as a Service (SaaS) on the Cloud - integration between disparate services, Quality of Service (QoS), security and monitoring infrastructure Business Process Modelling Service Modelling from the Software Engineering perspective - identification, specification and realisation of software services 2 3 Integration Architecture Dr Ryan (Leader), Dr Perepletchikov, Prof Tari 1

e.g. Web servers, P2P, Cloud Classical assumptions do not work New ways to do load balancing Guessing tasks size Traffic splitting Theoretical modelling (e.g. approximating Pareto) etc.. New directions: energy-based scheduling algorithms System Performance Prof Z. Tari (Leader), A/Prof Peter Bertok, Dr Ibrahim Khalil