Adv. Network Security How to Conduct Research in Network Security.

Slides:



Advertisements
Similar presentations
Protecting Cyber-TA Contributors: Risks and Challenges Vitaly Shmatikov The University of Texas at Austin.
Advertisements

Chapter 17: WEB COMPONENTS
Hash Function. What are hash functions? Just a method of compressing strings – E.g., H : {0,1}*  {0,1} 160 – Input is called “message”, output is “digest”
A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
Modelling and Analysing of Security Protocol: Lecture 11 Modelling Checking Tom Chothia CWI.
Trojan Horses/Worms Vadolas Margaritis Bantes George.
WebQuests Structured But Fun Web Lessons. Definition “An inquiry-oriented activity in which some or all of the information that learners interact with.
1 Intrusion Tolerance for NEST Bruno Dutertre, Steven Cheung SRI International NEST 2 Kickoff Meeting November 4, 2002.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
1 Next-Generation Secure Internet: Security Overview and Context Adrian Perrig in collaboration with Steven Bellovin, David Clark, Dawn Song.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Providing Trusted Paths Using Untrusted Components Andre L. M. dos Santos Georgia Institute of Technology
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Secure Overlay Services Adam Hathcock Information Assurance Lab Auburn University.
Computer Science 1 CSC 774 Advanced Network Security Dr. Peng Ning
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
Practice and Experience in the Application of Cryptography Bao Feng Cryptography and Security Department.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
Brian Padalino Sammy Lin Arnold Perez Helen Chen
1 MBA PROJECT Nasir Afghan/Asad Ilyas. 2 Objective To enable MBA students to execute a client focused challenging assignment and to enhance.
Networked Systems Practicum Lecture 1 – Introduction 1.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Web Policy Zeitgeist Panel SWPW 2005 – Galway, Ireland Piero Bonatti, November 7th, 2005.
1 CDA6938 Special Topic: Research in Computer and Network Security (spring’07) Class Overview.
Intrusion Detection Systems Austen Hayes Cameron Hinkel.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Monitoring for network security and management Cyber Solutions Inc.
Lecture 1 Page 1 CS 239, Fall 2010 Introduction CS 239 Advanced Topics in Computer Security Peter Reiher September 23, 2010.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Proposal for device identification PAR. Scope Unique per-device identifiers (DevID) Method or methods for authenticating that device is bound to that.
The Conclusion and The Defense CSCI 6620 Spring 2014 Thesis Projects: Chapters 11 and 12 CSCI 6620 Spring 2014 Thesis Projects: Chapters 11 and 12.
EPCglobal Network Security: Research Challenges and Solutions Yingjiu Li Assistant Professor School of Information Systems Singapore Management University.
Denial-of-Service Flooding Detection in Anonymity Networks Computer Networks & Communications Group Institute for IT-Security and Security Law University.
Presented by Spiros Antonatos Distributed Computing Systems Lab Institute of Computer Science FORTH.
Objectives Functionalities and services Architecture and software technologies Potential Applications –Link to research problems.
KAIST CS710 컴퓨터구조 특강 유비쿼터스 네트워크와 보안 Syllabus Network & Security Lab.
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
The UCSD Network Telescope A Real-time Monitoring System for Tracking Internet Attacks Stefan Savage David Moore, Geoff Voelker, and Colleen Shannon Department.
Mapping Internet Sensors with Probe Response Attacks Authors: John Bethencourt, Jason Franklin, Mary Vernon Published At: Usenix Security Symposium, 2005.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
1 CAP6133: Advanced Topics in Computer Security and Computer Forensics (spring’08) Class Overview Dr. Cliff Zou.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Detecting Selective Dropping Attacks in BGP Mooi Chuah Kun Huang November 2006.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Presented by Prof. Danilo Gligoroski MSc in Telematics Specialization in Information Security.
1 Computer Engineering Department Islamic University of Gaza ECOM 6303: Advanced Computer Networks (Graduate Course) Spr Prof. Mohammad A. Mikki.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
RFID Paper presentation The Security of EPC Gen2 Compliant RFID Protocols Source : Applied Cryptography and Network Security, VOL. 5037, 2008, pp
Innovative Intrusion-Resilient, DDoS-Resistant Authentication System (IDAS) System Yanjun Zhao.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
Big Data Security Issues in Cloud Management. BDWG Big Data Working Group Researchers 1: Data analytics for security 2: Privacy preserving 3: Big data-scale.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
CDA6938/COT4932 Special Topic: Research in Computer and Network Security (spring’06) Class Overview.
Research Methods Dr. X.
Detection and Analysis of Threats to the Energy Sector (DATES)
Digital Citizenship Background & Definitions
Jason cooper blockchain specialist Unlock blockchain 14 January 2018
TRUST:Team for Research in Ubiquitous Secure Technologies
Presentation transcript:

Adv. Network Security How to Conduct Research in Network Security

Background Infosec Fundamentals –Crypto. hash functions Properties –Symmetric key crypto. How it is used –Public key crypto. How it is used Possibly: basic number theory –General infosec requirements Standard Attacks

Class Goals Research –How to find problems/ideas –How to identify good solutions –How to evaluate solutions –How to present the work Network Security Research –Specific Problems –Specific Tools, Technologies, Methods –Attacks

Grading Final Project: 50% –Pre-project report: 15% –Pre-project presentation: 5% –Final project report: 25% –Final project presentation: 5% Paper Presentations: 20% Homeworks:30%

Final Project Purpose –Demonstrate ability to do original research Stages –1. Choosing the project –2. Create a direction & a testable idea Pre-project proposal due March 10th. –3. Experiment/Develop –4. Present Final report due on May 5th.

Final Project Project idea –Originality/Creativity is it interesting and novel? –Value is it a useful contribution? Methodology –Correctness does it test the right thing? –Depth is it a thorough investigation?

Final Project Experiment –Did it work? –How do you adapt?/future work Presentation –Highlighting key contributions –Clear presentation of results –Understanding of the related work

Paper Presentations Purpose –Develop Presentation Skills –Deeply understand a subset of the papers Paper Choice –We’ll discuss topics together as a class –I will choose most/all papers –Students can choose dates (e.g., which papers)

Paper Presentations Time –40 minutes Grading –50% other students –50% me Criteria –Highlight key contributions in light of related work –Clarity, Preparation, Depth of understanding

Homeworks Purpose –Directed study of the papers –Create discussion points for class Due –Every class –If not there in person, lose a point Still due within 1 week –3 pts. scale 0 - no good, 1 - weak, 2 - usual, 3 - very good

Possible Topics BGP Security –Leap Frog –Aggregated Path Authentication

Possible Topics Automated Trust Negotiation –Using Cryptographic Credentials –Attribute Information Leakage

Possible Topics P2P Security –Redundancy is cost-ineffective –Secure Publish-Subscribe Overlay –Applications of Secure E-Voting to Automated Privacy-Preserving Troubleshooting –Secure Collaboration

Possible Topics New Attacks –Misbehaving TCP Receivers –Fast Dictionary Attacks –Exploiting Open functionality in SMS –Mapping Internet Sensors –Vuln. of Passive Internet Monitors

Possible Topics Worms –Deriving Unknown Vulnerabilities Zero-day exploits –Effectiveness of Dist. Worm Monitoring –Polygraph: Sig. Generation –Worm Origin ID Using Random Moonwalks

Possible Topics DDoS Prevention –Stateless Multipath Overlays –Empirical Study of DOS attacks

Possible Topics Reputation –Anomaly Detection –A Framework... History-based Access Control

Possible Topics Key Management –Dynamic and Efficient... Access Hierarchies –Modeling Insider Attacks

Possible Topics Anonymity & Timing Attacks –Tracking VoIP Calls –Flooding attack on Tor –Improving Brumley and Boneh (SSH)

Possible Topics RFID –Untraceable RFID Tags –Security analysis of a device

Possible Topics e-Voting –Cryptographic Voting Protocols: Systems Perspective –Analysis of a e-Voting System (Diebold)

Possible Topics NIDS & Network Defense –Fast and Automated Gen. of Attack Sigs –Gen. Semantic Aware Sigs (2) –MulVAL: Netsec analyzer –Shadow Honeypots –Language-based gen. –Automaton Inlining