NETWORK SECURITY WITH GEO-LOCATION Using geo-location as a part of an authentication scheme Fan Zhang, Zhiqi Chen 12/11/2012.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Chapter 9: Privacy, Crime, and Security
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
 Guy Jacob  Roee Shapiro Project B Spring, 2009 Cloudio  Project Supervisor: Eddie Bortnikov  Lab Chief Engineer: Dr. Ilana David.
Electrical and Computer Engineering Vitaly Gordievsky Alex Trefonas Scott Richard Matt Beckford Final Project Review.
Electrical and Computer Engineering PeopleFinder Vitaly Gordievsky Alex Trefonas Scott Richard Matt Beckford Comprehensive Design Review.
Electrical and Computer Engineering GeoVault: Secure Location Tracking Final Project Review Nathan Franz Emily Nelson Thomas Petr Shanka Wijesundara.
Firefox 2 Feature Proposal: Remote User Profiles TeamOne August 3, 2007 TeamOne August 3, 2007.
INTRO TO MAKING A WEBSITE Mark Zhang.  HTML  CSS  Javascript  PHP  MySQL  …That’s a lot of stuff!
Room Locator App Aabhas Sharma Vinayak Gokhale Yehia Khoja 1 Room Locator App.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Introduction: This VCSS training session has been developed to provide : I.A quick overview of VCSS II.A walk through of the main VCSS features III.Solutions.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
USING REFWORKS Fall What is RefWorks? A web-based bibliographic and database manager Creighton University faculty, students, and staff have access.
Security Chapter What Should I Ask Santa Claus For? spoofing: fraudulent activity in which the sender address and other parts of the.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Design Extensions to Google+ CS6204 Privacy and Security.
Design for Senior Project December 05, 2007 Raytheon_Design_Review.ppt 1 of 19 Raytheon – Google Earth Roy Daniels, Marc Maciel, Rifina Pierre Department.
NETWORK SECURITY WITH GEO-LOCATION Using geo-location as a part of an authentication scheme Fan Zhang, Zhiqi Chen 12/11/2012.
HKUST Green Mobile App Chan Wai Yu, Candy Chung Kit Wai, Miffy Pang Wing Chau,Terry Wong Kin Yee, Phoebe Chan Wai Yu, Candy Chung Kit Wai, Miffy Pang Wing.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
CSCE Chapter 5 (Links, Images, & Multimedia) CSCE General Applications Programming Benito Mendoza 1 By Benito Mendoza Department.
Chapter 5 Creating an Image Map.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
In the web address box enter Enter your user ID (first and last initial 7 digit ID number) Select Log in.
NUOL Internet Application Services Final Presentation 24 th of May, 2004.
REAL TIME GPS TRACKING SYSTEM MSE PROJECT PHASE I PRESENTATION Bakor Kamal CIS 895.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
Multifactor Identification for Internet Banking Citizens State Bank Monticello, Iowa
URL Obscuring COEN 252 Computer Forensics  Thomas Schwarz, S.J
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
Digital Literacy Concepts and basic vocabulary. Digital Literacy Knowledge, skills, and behaviors used in digital devices (computers, tablets, smartphones)
NETWORKING & SYSTEM UPDATES
Links Building a Website Lesson 5. Links There are various ways to use links on a website: Link to other sites Link to other pages on the same site .
2004/051 >> Supply Chain Solutions That Deliver Users.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
05 | Integrating JavaScript and MVC 4 Jon Galloway | Tech Evangelist Christopher Harrison | Head Geek.
Virtual Machines Module 2. Objectives Define virtual machine Define common terminology Identify advantages and disadvantages Determine what software is.
Internet Advancement Inland Northwest Council Program & Training Conference December 2011 Session Leader: Paul Yelk For Troops/Teams/Crews.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Phonegap Bridge –Geolocation and Google maps CIS 136 Building Mobile Apps 1.
Computer Security Set of slides 8 Dr Alexei Vernitski.
CAESked Computer Aided Engineering Scheduler. Introduction Team Members: Chris Fruin & Jerry Grochowski What CAESked is: Web based class scheduling application.
Internet Security TEAMS March 18 th, ISP:Internet Service Provider.
New Client Portal Instructions. Welcome to the NEW Julie K Wiedner CPA, PC Client Portal. We are providing you with these instructions to aid in setting.
Student 365 Lookup Directions
BUILD SECURE PRODUCTS AND SERVICES
To the Geoview - Editing for OSR Applications Online Training Course
100% Exam Passing Guarantee & Money Back Assurance
Managing Secure Network Systems
Ways to protect yourself against hackers
ISYM 540 Current Topics in Information System Management
Secure Software Confidentiality Integrity Data Security Authentication
Introduction to Networking
Naming and Directories
Starter What is identity theft?
Naming and Directories
Naming and Directories
Student 365 Lookup Directions
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
To the Geoview - Editing for OSR Applications Online Training Course
Recitation on AdFisher
Security in mobile technologies
Naming and Directories
Wireless Spoofing Attacks on Mobile Devices
Presentation transcript:

NETWORK SECURITY WITH GEO-LOCATION Using geo-location as a part of an authentication scheme Fan Zhang, Zhiqi Chen 12/11/2012

Overview Introduction Problem Motivation Problem Statement Challenges Solutions Result Related Work Validation Revision Future work

Introduction Geo-location will be used as a part of authentication scheme Geo-location + Password/Username Objective: Enhance network security

Problem Motivation Internet frauds Hacker attacks Password cracking Spoofing attack (Phishing) User authentication Username/Password Some websites may add other techniques (confirmation , IP address, MAC address)

Problem Motivation HTML 5: Geo-location Common sources of location information Global Positioning System (GPS) WiFi IP address Browser support

Related works Localizing the Internet: Implications of and Challenges in Geo-locating Everything Digital Michael R. Evans and Chintan Patel University of Minnesota Computer Science and Engineering “Technology that allowed for universal authentication and location-determination services for permitted parties would allow a person to restrict online banking access to their own homes, or a government entity to require that classified information be accessed within pre-determined spatial boundaries. “

Related works Our project presents Implementation details Main limitation: Only conceptual knowledge, NO implementation

Problem Statement Normal User Authentication

Problem statement Authentication with Geo-location

Challenges Fetch each building’s shapefile Each building’s shapefile save as a KML file KmlLayer can’t be modified after render out Can’t obtain coordinates from KmlLayer The figure shows the KmlLayer render out on Google maps

Challenges Find functions to determine whether a location is inside a polygon or not Limited functions for KmlLayer in Google maps API

Solutions Implement Geo-location with HTML 5 to locate user’s location Use google.maps.Polygon instead of KmlLayer More functions support

Solutions Export shapefile into KML file Extract building’s coordinates from KML file AJAX: load KML file Jquery: find the coordinates for the building and create polygon use the coordinates. google.maps.geometry library: google.maps.geometry.poly.containsLocation(point:LatLng, polygon:Polygon)

Solutions User NOT IN the authenticated area Alter window popup, user will not be forwarded Authenticated area: Kenneth H. Keller Hall

Solutions User IN the authenticated area  Set a time delay to see the map  After authentication, forward user to home page For demonstration purpose, the webpage twitter feeds  Python  Django  Tweepy

Validation Coffman Memorial Union  Geo-location authentication success  Forward to the demo website

Validation Student Teaching & Student Service  Geo-location authentication success  Forward to the demo website

Validation Walter library  Geo-location authentication success  Forward to the demo website  User moved to another location inside of the building  Geo-location authentication success  Forward to the demo website

Validation Kenneth H. Keller Hall  User moved to three different locations inside of the building Top left: computer lab Top right: KH Bottom left: grand lounge  Geo-location authentication failed Alter window popup  Geo-location authentication success Forward to the demo website

Validation Kenneth H. Keller Hall  Cellphone GPS  User’s location: KHKH  Geo-location authentication success most of time

Revision(suggestions from group 8) User specified a point with certain radius  Due to the inaccurate of Geo-location  Change the idea of the authenticated area from a building to a circle area  This update will give user more freedom to specify their favorite locations  No more need KML file

Revision(suggestions from group 8) IP address lookup In order to prevent the fake location login IP address lookup could enhance the security of authentication process Depend on the security requirements, use MAC address lookup could be more safe than IP address lookup

Future Work Due to the Geo-location API not guarantee to return device’s actual location, the reliability of Geo-location authentication is not guaranteed. Build multiple location support for geo-location authentication. Welcome to folks me on GitHub git://github.com/fanzhang312/FetchTwitterFeeds_Tweepy.git

Thanks Any questions?