The School of Electrical Engineering and Computer Science (EECS) CS/ECE Introduction to Network Security Dr. Attila Altay Yavuz Big Picture and Organization.

Slides:



Advertisements
Similar presentations
Suggested Course Outline Cloud Computing Bahga & Madisetti, © 2014Book website:
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
ECE 355 Introduction to Computer Networks and Data Communications
1 Computer Engineering Department College of Computer Sciences and Engineering Tuesday 18 November 2008 King Fahd University of Petroleum & Minerals.
1 i206: Distributed Computing Applications & Infrastructure 2012
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
FIT5037 Advanced Network Security --- Modern Computing and Security --- Lecture 1.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Foundations of Programming Languages – Course Overview Xinyu Feng Acknowledgments: some slides taken or adapted from lecture notes of Stanford CS242
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
NYIT TUES Evaluation May 2014 Dr. Sarah McPherson Evaluator NYIT School of Education.
Cryptography and Network Security
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Need for Privacy Enhancing Technologies 1 What is challenging about standard encryption?
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
CSCE 727 Information Warfare
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
1 ECE 156 Computer Network Architecture Professor Krish Chakrabarty Department of Electrical and Computer Engineering Fall 2006.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Advanced Network Security Dr. Attila Altay Yavuz Big Picture and Organization Advanced.
Cryptography and Network Security (CS435) Part One (Introduction)
Proposal for Term Project Information Security, Fall 2014 J. H. Wang Sep. 25, 2014.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Applied Cryptography Dr. Attila Altay Yavuz Big Picture and Organization Applied.
CSCE 824 Secure (and Distributed) Database Management Systems FarkasCSCE
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Advanced Network Security Dr. Attila Altay Yavuz Topic 1.0 Big Picture, Vision.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Introduction to Network Security Dr. Attila Altay Yavuz Big Picture and Organization.
Koji OKAMURA Cybersecurity Center, Kyushu University Cybersecurity Education.
Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering.
Security of the Internet of Things: perspectives and challenges
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
Proposal for Term Project Information Security, Fall 2013 J. H. Wang Nov. 5, 2013.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Big Picture and Organization
CS/ECE 578 Cyber-Security Dr. Attila Altay Yavuz
Principles of Computer Security
CS/ECE Applied Cryptography Dr. Attila Altay Yavuz
사물네트워크 시스템 보안 - Focused on Advanced Cryptography-
Data & Network Security
Data and Applications Security Developments and Directions
CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Course Overview and Organization
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Introduction to Course
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

The School of Electrical Engineering and Computer Science (EECS) CS/ECE Introduction to Network Security Dr. Attila Altay Yavuz Big Picture and Organization Introduction to Network Security Dr. Attila Altay Yavuz1Spring 2015

OSU EECS Dr. Attila Altay Yavuz 2 Outline (current lecture) Self-introduction Big Picture –Grand-vision, problems and challenges Course Objectives ( overview) –Touching important problems and tools (name & functionality) –Going over Syllabus Further info about this course –Grading –Requirements –Position of this course in “OSU-Security Landscape”

OSU EECS Dr. Attila Altay Yavuz 3 Self-Intro Assistant Professor, EECS at Oregon State University Adjunct Faculty, University of Pittsburgh (Jan now) Research Scientist, Bosch Research Center (Dec Aug. 2014) –Develop security and privacy research programs –Privacy-preserving Big Data Technologies (~1M) –Secure Internet of Things and Systems (~250K) Ph.D., North Carolina State University (Jan Aug. 2011) –Compromise Resilient and Compact Crypto for Digital Forensics MS, Bogazici University ( ) –Efficient Crypto Mechanisms for Military Ad-hoc Networks

OSU EECS Dr. Attila Altay Yavuz 4 Self-Intro (Cont’) Research Interests: Applied cryptography, network security, privacy Academic Collaborations: Upitt, UNC, UCI, Purdue-CIT, CMU Industry Collaborations: Bosch, Oracle, Cisco, SEI-CMU, ISE Some Impact Examples: ECU Privacy-Preserving Medical Databases (HCTM, 2016) Secure Intra-car Networks (OEMs, 2018)

OSU EECS Medium term Long term Near term Big Picture: Technology Trends & Vision Smart-infrastructures and distributed systems Big Data Technologies Cloud-based Applications Smart Home Inter vehicular networks Smart-grid Smart-city Digitalized Healthcare Inf. Sys. 5

Challenges of Security and Privacy in IoTS Requirements and Challenges Cloud-based Services Smart-home and WSNs Heterogeneity Vehicular networks (e.g., Car-2-X) High Performance/Scalability Data Availability Interconnectivity 6 SOMETHING MISSING?

Need for Privacy Enhancing Technologies 7 Privacy Breaches: Big Data and IoTS

OSU EECS Cyber Physical Systems - Vulnerabilities Reliable Cyber-Physical Systems (e.g., smart-grid) are vital – Susceptible: Northeast blackout (2003), 50 million people, $10 billion cost – Attacks: False data injection [Yao CCS09’], over 200 cyber-attacks in 2013 Vulnerability: Commands and measurements are not authenticated Requirements for a security method – Real-time  Extremely fast processing (a few ms) – Limited bandwidth  Compact – Several components  Scalability Limitations of Existing Methods – PKC is not yet feasible (computation, storage, tag size) – Symmetric crypto is not scalable (key management ) 8

OSU EECS Security Challenges for Smart-Infrastructures (II) 9 Internet ECU Vulnerability: Commands and measurements are not authenticated Security for Inter-car Networks – Manipulate direction/velocity, crashes Security for Intra-car Networks – Large attack surface [Usenix '11] – ECUs of break/acceleration, airbag Challenges – Strict safety requirements – Limited bandwidth, real-time processing The state-of-art cannot address (as discussed) Inter-car and Intra-car Networks

OSU EECS Heterogeneity: Resource-Constraints vs. Efficiency Requirements –Designing efficient cryptographic primitives for resource-constrained systems –Code-size, battery issues, transmission range, cost –Specialized Authentication and Integrity Methods Scalability: Key Distribution vs. Efficiency Requirements –Symmetric crypto, O(n^2) key distribution, very fast but not scalable –Public key, how to distribute certificates? –Advanced Key Establishment, Distribution and Management Methods Outsourcing vs. Privacy/Integrity Dilemma –How to operate on the encrypted data efficiently? How to ensure the integrity? –Privacy Enhancing Technologies: Searchable Encryption, Oblivious RAM, Differential Privacy, Secure MPC… Interconnectivity and increased attack surface –Extra tools, primitives, and all above an integrated manner Resiliency, fault-tolerance, compromise-resiliency, and more… 10 Some Challenges – About Landspace

OSU EECS Pillars and Key Cyber Security Approaches Pillar I-II: Authentication and Integrity – Broadcast Authentication: Internet, wireless net., multi-media, … Vehicular networks, power-grid, smart-grid, drones… – Specialized Signatures: Real-time, compromise-resilient, hybrid, … Pillar III: Privacy (Confidentiality) and Functionality – Privacy Enhancing Technologies – Cloud computing and data outsourcing: SE, DF, MPC, ORAM, PoR – Privacy-preserving data mining Pillar IV: Availability and Resiliency – Denial of Service (Client-server application) – Fault-tolerance via redundancy and secret sharing, effective storage Packet loss (any comm. medium) Active adversaries – 11

OSU EECS Dr. Attila Altay Yavuz 12 Outline (current lecture) Self-introduction Big Picture –Grand-vision, problems and challenges Course Objectives ( overview) –Touching important problems and tools (name & functionality) –Going over Syllabus (from webpage) Further info about this course –Grading –Requirements –Position of this course in “OSU-Security Landscape”

OSU EECS High-Level Objectives Create foundations/background to tackle these challenges! Cryptographic primitives and Net. Sec. foundations: –Essential cryptographic building blocks –Crypto primitives –Their properties and use Basic Service: Authentication –Primitives and protocols Key Management and Establishment Protocols Net. Sec. Protocols and some Adv. Topics

OSU EECS Dr. Attila Altay Yavuz 14 Outline (current lecture) Self-introduction Big Picture –Grand-vision, problems and challenges Course Objectives ( overview) –Touching important problems and tools (name & functionality) –Going over Syllabus Further info about this course –Grading –Requirements –Position of this course in “OSU-Security Landscape”

OSU EECS CS 372 is required. A basic understanding of security mechanisms is good. Homeworks, %50 (3 or 4 HWs) Midterm %20, Final %25 Class attendance, participation %5 HWs are non-trivial and research-oriented (10-14 days, plenty of time!) Cover a concept related to class topics as a complementary aspect –E.g., Block ciphers and DES will be covered in-class, AES will be explored in HW Research and exploration of concepts –Research problem X is vital and addresses Y, explain the most recent methods in your words by reading and distilling respected conference/journal papers… –Compare and contrast protocol X and Y w.r.t. parameters A,B,C… –No extensive programming assignments are considered for now (not hands-on focused) Traditional questions involving design and explanations from class material Design, analysis and construction of primitives/protocols (not implement them) –Crypto architecture, cryptographic engineer or researcher Midterm and final will capture both course material and HWs 15 Requirements and Grading

OSU EECS Cyber Security with a focus on System Aspects (with hands-on focus) –Undergraduate: DADE, Introduction to Security –Graduate: System Security, Distributed Systems Cyber Security with a focus on Theorem Aspects (with sec. model/proof focus) –Undergraduate: Introduction to Crypto –Graduate: Theoretical Cryptography, Complexity Theory Cyber Security with a focus on Bridging Theory and Practice –Undergraduate: Introduction to Network Security Focus on the design and analysis of schemes and protocols Prepare for research-oriented track: Crypto Architect, Cryptographic Engineering, move towards research career Prepare the below grad courses plus grad-level system security courses –Graduate: Full research and project oriented, aim for research labs. and academia –Special Topics: Advanced Network Security –Special Topics: Applied Cryptography –Some (ultra brief) aspects described 16 OSU-Cyber Security Landscape