Application of Situation assessment in WIDS Håvard Hasli Supervised by Slobodan Petrović.

Slides:



Advertisements
Similar presentations
Introduction to the Network AHRC Interdisciplinary Network on Teaching of Ethics for Neuroscientists.
Advertisements

Addressing IPv6 Vulnerabilities on Small Business Networks Bradley HainesVincent Pullano University of Cincinnati College of Education, Criminal Justice,
The AGILO Autonomous Robot Soccer Team: Computational Principles, Experiences, and Perspectives Michael Beetz, Sebastian Buck, Robert Hanek, Thorsten Schmitt,
Base Protection Lab (BPL) December 12, 2007 ONR Program Officer: William “Kip” Krebs, , Alternate POC: Annetta Burger.
Title of Presentation Author 1, Author 2, Author 3, Author 4 Abstract Introduction This is my abstract. This is my abstract. This is my abstract. This.
12/6/2010CS Andrew Bates - UCCS1 Intrusion Detection and Advanced Persistent Threats CS 591 Andrew Bates University of Colorado at Colorado Springs.
Information Security Incident Management Process
Geneva, Switzerland, 2 June 2014 Study on Spoofed Call Detection and Prevention in 3GPP China Mobile ITU Workshop on “Caller ID Spoofing” (Geneva, Switzerland,
Computer Account Hijacking Detection Using a Neural Network Nick Pongratz Math 340.
Members: Jennifer Au, Anthony Bonomo, Laura Freyman, Brian Kwong, Benjamin Li, Jessica Lieberman, Levon Mktrchyan, Michael Price, Andrew Skoda, Mary Tellers,
Alert Correlation for Extracting Attack Strategies Authors: B. Zhu and A. A. Ghorbani Source: IJNS review paper Reporter: Chun-Ta Li ( 李俊達 )
Network Coding Testbed Jeremy Bergan, Ben Green, Alex Lee.
Integration of a medicine dispenser unit to the ThereGate system Project plan Matthias Füller Viktor Kovács AS Project Works in Automation.
Information Fusion in Continuous Assurance Johan Perols University of San Diego Uday Murthy University of South Florida UWCISA Symposium October 2, 2009.
CybAIRVision® Next generation of Cyber-attacks : “Air Operations cyber intrusion detection”
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Pushing the Security Boundaries of Ubiquitous Computing ACSF 2006 —————— 13 th July 2006 —————— David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith.
Presentation of Master’s thesis Simulation and Analysis of Wireless Mesh Network In Smart Grid / Advanced Metering Infrastructure Philip Huynh.
State Data Center Oregon Consumer Identity Theft Protection Act Information Forum October 31, 2007.
How to start research V. Jayalakshmi. Why do we research? – To solve a problem – To satisfy an itch – To gain more market share/ Develop and improve –
How to Make a friend By Alexa. Introduction If you want to learn how to make friends Follow these instructions. And, make sure you read my how to.
Synthetic Cognitive Agent Situational Awareness Components Sanford T. Freedman and Julie A. Adams Department of Electrical Engineering and Computer Science.
4H1767 B 1.PPT INTRODUCTION STRATEGIC PLANNING METHOD OVERVIEW SITUATIONAL ANALYSIS POSITION IMPLEMENTATION PROGRAMS GOALS OBJECTIVES CONCLUSIONS PROJECTS.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
Investigation and Evaluation of Systems for Generating Automatic Alerts Using Honeynet Data Master’s Thesis Seminar Presentation Esko Harjama.
INFSCI 2935: Introduction to Computer Security1 Project Implementation Implementation  Reasonable sophistication  Up to 3 people maximum Survey type.
Free Powerpoint Templates Page 1 Free Powerpoint Templates FP7 – Secure Enterprise Remote Banking System (SERBS) Small or medium scale focused research.
© FIRMA EVK1-CT Neg-o-Net (v.2.0) Capturing stakeholder negotiation within FIRMA David Hales
Doc.: IEEE /133r0 Submission March 2003 Michael Park, Samsung Electronics co., LtdSlide 1 Project: IEEE P Working Group for Wireless Personal.
Right on Track towards a safe and interoperable Europe? 2 April 2014 Luc Lallemand Vice President EIM CEO Infrabel Belgium Rail Infrastructure Manager.
EECS 4482 Fall 2014 Session 8 Slides. IT Security Standards and Procedures An information security policy is at a corporate, high level and generally.
Secure In-Network Aggregation for Wireless Sensor Networks
A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726.
Network Security Major Problems Network Security Major Problems Why Firewall? Why Firewall? Problems with Firewalls Problems with Firewalls What is.
Retrieval-Guaranteed Location-Aware Information Brokerage Scheme in 3D Wireless Ad Hoc Networks.
Development of System Operation Network Codes ACER Workshop 24 August 2011 Ole Jan Olesen, Convenor ENTSO-E Working Group on European Operational Standards.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
Progress presentation
James S. Rothfuss, Computer Protection Program COMPUTING SCIENCES NETS Network Equipment Tracking System.
Winter 2007SEG2101 Chapter 121 Chapter 12 Verification and Validation.
Fen Hou 、 Lin X. Cai, University of Waterloo Xuemin Shen, Rutgers University Jianwei Huang, Northwestern University IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY,
Global SCM Combine HSS Rack & Crane For improve container terminal productive Song yun ho Paper proposal.
School Safety and Security Proposed Projects and Upgrades.
Atos, Atos and fish symbol, Atos Origin and fish symbol, Atos Consulting, and the fish symbol itself are registered trademarks of Atos Origin SA. June.
A Fragmented Approach by Tim Micheletto. It is a way of having multiple cache servers handling data to perform a sort of load balancing It is also referred.
DIVYA K 1RN09IS016 RNSIT1. Cloud computing provides a framework for supporting end users easily through internet. One of the security issues is how to.
Standard: Security Methods Jason Gibson TCM471 Professor Crum.
WIRELESS GATEWAYS FOR HOME USE AND ENTERPRISE USE NOR HANANI BINTI SAHARUDIN TSK 1.
Some Great Open Source Intrusion Detection Systems (IDSs)
Under the Guidance of V.Rajashekhar M.Tech Assistant Professor
<Student’s name>
ECE 6397, Fall, 2012 Selected Topic in Optimization
Project Title Presented By Student1 name - Roll no
System Control based Renewable Energy Resources in Smart Grid Consumer
User Interference Effect on Routing of Cognitive Radio Ad-Hoc Networks
Faloutsos: My Areas of Research
A-5 Limits on amount of exchange or sharing of FRR between Synchronous Areas according to Article 118(z) SOGL.
Ekereuke Udoh Distributed and Intelligent Systems Research Group
سازمان پژوهش و برنامه ريزي آموزشي كارگاه شيوه نگارش مقاله تحقيقي
Find two examples that support each answer
AVOIDANCE OF SYSTEM DEADLOCKS IN REAL TIME CONTROL OF FLEXIBLE MANUFACTURING SYSTEMS By Richard A. Wysk.
A-6 Limits on amount of exchange or sharing of RR between Synchronous Areas according to Article 118(aa) SOGL.
Level 2 Diploma Unit 11 IT Security
Assoc. Prof. Dr. Syed Abdul-Rahman Al-Haddad
SUSPICIOUS ACTIVITY DETECTION
August 2013 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Enhancing and missing simulation result.
Hydrographic Services and Standards Committee
POL Spring 2016.
ETSI–3GPP NGN ACTIVITIES
Presented By Student1 name - Roll no Student2 name - Roll no
Presentation transcript:

Application of Situation assessment in WIDS Håvard Hasli Supervised by Slobodan Petrović

About my thesis Research questions Methods Results Conclusion Introduction

About Situation Assessment in WIDS Wireless Intrusion Detection System (WIDS) Combining information from several sources Handling missing values and priority of sources Create an overall assessment of the situation Present the assessment

Building blocks of a SA-system Agent-data network Agent-data physical Synchronize input Situation assessment Other agents

Research Questions How can situation assessment be implemented in a wireless intrusion detection system (WIDS)? Can application of SA increase security in WIDS?

Making of the prototype Analysis of the proposed system Agent class Assessment class Presentation class

Results Prototype which can simulate agents Different priority of each source Tons of further work

Conclusion Yes, one can say that it is possible to implement SA in WIDS It can increase security, but this require action to be taken when an alert is detected

?? Questions ??