CS overview - Fall 2005 The Department of Computer Science at Columbia University Henning Schulzrinne, Chair Dept. of Computer Science Columbia University.

Slides:



Advertisements
Similar presentations
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
© 2005 Mobile VCE Securing the Future: Device & Service Security Stephen Hope, FT R&D UK Ltd on behalf of Nigel Jefferies, Vodafone Chair.
TAC Vista Security. Target  TAC Vista & Security Integration  Key customer groups –Existing TAC Vista users Provide features and hardware for security.
- October 22, 2004 The Department of Computer Science at Columbia University Henning Schulzrinne, Chair Dept. of Computer Science Columbia University.
CS overview - Fall 2005 The Department of Computer Science at Columbia University Henning Schulzrinne, Chair Dept. of Computer Science Columbia University.
02/12/00 E-Business Architecture
Columbia’s Vision for Tomorrow’s Global Intelligent Systems Henning Schulzrinne, Chair Department of Computer Science October 13, 2005 Bill Gates/CS Faculty.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
Columbia’s Vision for Tomorrow’s Global Intelligent Systems Henning Schulzrinne, Chair Department of Computer Science October 13, 2005 Bill Gates/CS Faculty.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
CS overview - Fall 2006 The Department of Computer Science at Columbia University Henning Schulzrinne, Chair Dept. of Computer Science Columbia University.
Applied Cryptography for Network Security
Pervasive Pixels Henning Schulzrinne (PI) Steven K. Feiner Gail Kaiser John Kender Kathleen McKeown Department of Computer Science Columbia University.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
- October 22, 2004 The Department of Computer Science at Columbia University Henning Schulzrinne, Chair Dept. of Computer Science Columbia University.
Maintaining and Updating Windows Server 2008
Distributed Systems: Client/Server Computing
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
EDUCAUSE Security 2006 Internet John Brown University.
Introduction to Computer and Programming CS-101 Lecture 6 By : Lecturer : Omer Salih Dawood Department of Computer Science College of Arts and Science.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Quality Attributes of Web Software Applications – Jeff Offutt By Julia Erdman SE 510 October 8, 2003.
Introduction and Overview Questions answered in this lecture: What is an operating system? How have operating systems evolved? Why study operating systems?
IOT5_ GISFI # 05, June 20 – 22, 2011, Hyderabad, India 1 Internet of Things Work Group Coordination Plan WG Chair.
Honeypot and Intrusion Detection System
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Distributed Systems: Concepts and Design Chapter 1 Pages
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Configuring Directory Certificate Services Lesson 13.
An Analysis of Location-Hiding Using Overlay Networks Ju Wang and Andrew A. Chien Department of Computer Science and Engineering, University of California.
Semantics for Cybersecurity and Privacy Tim Finin, UMBC Joint work with Anupam Joshi, Karuna Joshi, Zareen Syed andmany UMBC graduate students
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Foundations of Secure Networked Computing Participants: Chen-Nee Chuah Joan Feigenbaum Russell Impagliazzo Matti Kaariainen Karl Levitt Scott Shenker Salil.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Computing Ontology Part II. So far, We have seen the history of the ACM computing classification system – What have you observed? – What topics from CS2013.
CS overview - Fall 2008 The Department of Computer Science at Columbia University Henning Schulzrinne, Chair Dept. of Computer Science Columbia University.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Unit 9: Distributing Computing & Networking Kaplan University 1.
SPYCE/May’04 coverage: A Cooperative Immunization System for an Untrusting Internet Kostas Anagnostakis University of Pennsylvania Joint work with: Michael.
Security Vulnerabilities in A Virtual Environment
Cryptography and Network Security Sixth Edition by William Stallings.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
A Case Study on Computer Worms Balaji Badam. Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation.
Role Of Network IDS in Network Perimeter Defense.
Computer Science and Engineering Department The University of Texas at Arlington MavHome: An Intelligent Home Environment.
Henning Schulzrinne, Chair Department of Computer Science December 1, 2005 Computer Science at Columbia University.
REU 2009 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Information Processing.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Maintaining and Updating Windows Server 2008 Lesson 8.
Jason Ewing. What is an Intrusion Why Detecting Signs of Intrusion is Important? Types of Intrusion Detection Systems (IDS) Approaches for Detection Anomaly.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Columbia University Department of Computer Science Henning Schulzrinne 2001 NSF CISE/EIA RI PI’s Workshop.
Botnets A collection of compromised machines
Department of Computer Science
Columbia University Department of Computer Science
Botnets A collection of compromised machines
Presentation transcript:

CS overview - Fall 2005 The Department of Computer Science at Columbia University Henning Schulzrinne, Chair Dept. of Computer Science Columbia University 2005

CS overview - Fall 2005 Columbia Computer Science in Numbers ~34 full-time faculty and lecturers + visitors, postdocs, adjunct faculty, joint appointments (EE, IEOR), …

CS overview - Fall 2005 Interacting with Humans (5) Interacting with Humans (5) Designing Digital Systems (4) Designing Digital Systems (4) Systems (11) Systems (11) Interacting with the Physical World (9) Interacting with the Physical World (9) Computer Science Theory (8) Research Making Sense of Data (7) Making Sense of Data (7)

CS overview - Fall 2005 Research areas Interacting with the Physical World graphics, robotics, vision Allen, Belhumeur, Feiner, Grinspun, Grunschlag, Jebara, Kender, Nayar, Ramamoorthi Interacting with Humans user interfaces, natural language and speech processing, collaborative work, personalized agents Feiner, Hirschberg, Kaiser, Kender, McKeown Systems networks, distributed systems, security, compilers, software engineering, programming languages, OS Aho, Bellovin, Edwards, Kaiser, Keromytis, Malkin, Misra, Nieh, Schulzrinne, Stolfo, Yemini Designing Digital Systems digital and VLSI design, CAD, asynchronous circuits, embedded systems Carloni, Edwards, Nowick, Unger Making Sense of Data databases, data mining, Web search, machine learning applications Cannon, Gravano, Jebara, Kaiser, Ross, Servedio, Stolfo Computer Science Theory cryptography, quantum computing, complexity, machine learning theory, graph theory, algorithms Aho, Galil, Gross, Malkin, Servedio, Traub, Wozniakowski, Yannakakis

CS overview - Fall 2005 Interacting with Humans (5) Interacting with Humans (5) Interacting with the Physical World (9) Interacting with the Physical World (9) Research

CS overview - Fall 2005 Newsblaster Automatic summarization of articles on the same event Generation of summary sentences Tracking events across days Foreign new  English summaries

CS overview - Fall 2005 Task Based Evaluation: Do summaries help users with research? Quality of facts gathered significantly better With Newsblaster than with no summaries User satisfaction higher With Newsblaster sentence summaries than Google style 1-sentence summaries Summaries contributed important facts With Newsblaster than Google summaries Full multi-document summarization more powerful than documents alone or single sentence summarization

CS overview - Fall 2005 Spoken Language Processing (Julia Hirschberg) Detecting and generating speakers’ emotional state Corpus-based, using lexical, acoustic and prosodic features Areas: Deceptive Speech vs. Truth-telling Anger/frustration, confidence/certainty in Online Tutoring Systems Charismatic Speech: What makes some speakers charismatic?

CS overview - Fall 2005 Systems (11) Systems (11) Research

CS overview - Fall 2005 Distributed Network Analysis (DNA) Faculty: Vishal Misra, Dan Rubenstein Mathematical modeling of communication/network systems also prototype & experiment to validate theory Topics: Resilient and Secure Networking Wireless (802.11, Mesh) Sensor Networks Overlay and P2P Networking Server Farms Analytical Techniques Stochastics Algorithms Control Theory, Queueing Theory, Information Theory

CS overview - Fall 2005 Distributed Multi-radio Allocation in Wireless Mesh Networks Research Objectives Improve the throughput of multi-hop networks by utilizing multiple channels. Develop a fully-distributed, self-stabilizing algorithm and protocol that assign channels to nodes. Build an experimental system using commodity hardware and evaluate the performance of the algorithm. Approach Multi-radio stations Semi-static channel assignment Goals Minimize interference Maintain connectivity Use self-stabilizing graph coloring algorithm

CS overview - Fall 2005 CEPSR research building Channel Allocation Protocol TCP/IP MCL* card A802.11card B NDIS**DevCon Windows XP Wireless Mesh Network Testbed 10 mesh boxes (sponsored by MSR) + 5 Desktop PCs b/g/a wireless adapters Mesh Connectivy Layer toolkit from MSR Multi-radio mesh node Allocates radios by Self- stabilizing algorithm based on graph coloring Fully distributed and self- organizing mechanism Mesh monitoring system Monitors and controls mesh networks from remote site Consistent throughput improvement of 20-50% for network

CS overview - Fall 2005 Evolution of VoIP “amazing – the phone rings” “does it do call transfer?” “how can I make it stop ringing?” catching up with the digital PBX long-distance calling, ca going beyond the black phone

CS overview - Fall 2005 Context-aware communication context = “the interrelated conditions in which something exists or occurs” anything known about the participants in the (potential) communication relationship both at caller and callee timeCPL capabilitiescaller preferences locationlocation-based call routing location events activity/availabilitypresence sensor data (mood, bio)privacy issues similar to location data

CS overview - Fall 2005 Creating services for VoIP Telecom model: Programmers create mass- market applications Web model: Users and administrators create universe of tailored applications “FrontPage for service creation” Based on presence, location, privacy preferences

CS overview - Fall 2005 System Administration Not much research done Generally ad hoc A high percentage of exploits occurs from sysadmin failings

CS overview - Fall 2005 Patch Management Patches have a high probability of breaking applications Production systems can't be patched without testing – but exploits frequently show up after the patch is released

CS overview - Fall 2005 Human Factors People don't know how to use security mechanisms People don't understand the effects of various security settings. If a user is running without root/Administrator privileges, are there normal operations that that person can't do? How do you grant that permission only? What threats are avoided by running without privileges?

CS overview - Fall 2005 Objective Deploy a collaborative intrusion detection and prevention solution capable of detecting “slow and low” broad stealthy scans, reconnaissance activities, and related behavior as precursors to a worm or targeted attack to multiple organizations in business longitudes. Leverage both header and payload anomaly detection to employ multiple defense strategies, including signature generation, to proactively protect vulnerable networks before the attack happens. June 14, 2005 Developing Profiles of Attackers: A Longitudinal Study Worminator/PAYL Intrusion Detection Group, Columbia University WWW: Scientific/Technical Approaches Worminator integrates with best-of-breed IDS sensors and enables privacy-preserving alert exchange between sites, finding and building profiles of common sources of scan or attack. PAYL (PAYLoad Anomaly Detection) enriches Worminator with information about common signatures of exploits or attacks, enabling a comprehensive response Next Generation Attacks New worms and attack vectors leverage a hitlist to reduce spread time upon launch These hitlists are built in massively parallel, very slow-and-stealthy fashion “Critical infrastructure” an increasing target from these sources By rapidly profiling sources of these hitlist generators, we can proactively protect vulnerable targets, even with “zero-day worms” Site B Site C Site A Surveillence detected at site A Surveillence detected at site B Surveillence detected at site C Common sources of scans for all three sites Profile and signature generation for defense

CS overview - Fall 2005 Computer Science Theory (8) Research

CS overview - Fall 2005 Foundations of Cryptography: The Next Generation Traditional Cryptography achieves provable security of protocols, but assumes a clean, controlled model (e.g., strongly relies on the secret keys being completely protected). This is not sufficient for the way crypto is used today! e.g., over the internet, concurrently with many other protocols; Crypto used everywhere, sometimes on small portable devices (smartcard, PDA), thus many opportunities to leak key. Key exposure is a major cause of security breaches, much more so than cryptanalysis. Our Work: expand theoretical foundations to capture provable security against strong, realistic attackers, including: Security when attacker can read the secret key (key exposure) Security when attacker can modify the secret key (tampering) Security against side channel attacks (power, timing analysis) Security in an Internet-like setting (when attacker can coordinate across several, unaware of each other, protocols).