CS 525 – Network Security Literature Reviews, LaTeX, and Starting a Proposal.

Slides:



Advertisements
Similar presentations
Reference Management and Knowledge Organization. Citavi and The Process of Scholarly Writing GatheringPlanningStudying Organizing Knowledge Publishing.
Advertisements

Internet and Modern Life
Internet Search Lecture # 3.
Heilmeier's catechism To evaluate research activities at Darpa, Heilmeier formulated a set of questions.
But nobody told me this! Planning for success Mario Borunda and Girish Chowdhary (The advise I whish I had been told)
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
20 03 TASTE OF RESEARCH SUMMER SCHOLARSHIPS Author: Wei Zhang Supervisor: Tim Moors Efficient Voice Over Wireless Network Abstract The objective of this.
CSCD 555 Research Methods for Computer Science
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition Chapter 9 Network Services.
Welcome to CS 395/495 Measurement and Analysis of Online Social Networks.
Welcome to CS 395/495 Internet Architectures. What is this class about? (1) Goal: to help you understand what the future Internet will look like –What.
Technical Writing Structure, Logic (between sentences and paragraphs), and Strictness (no holes). Know who is your audiences Structure – Title and keyword:
Welcome to the CINAHL* tutorial By the end of this tutorial you should be able to: Do a basic search to find references Use search techniques to make your.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Networking Components
Google Scholar Tools, Tips, and Tricks 1 Ben Hockenberry Systems Librarian SJFC Lavery Library.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
 Design creates a new artifact (system, component or process) to meet a given need.  Broad Classifications ◦ Creative Designs – the first PDAs ◦ Variant.
Lecture 29 Page 1 Advanced Network Security Privacy in Networking Advanced Network Security Peter Reiher August, 2014.
Writing… and Coding CSE/ISE 300 Spring 2011 Tony Scarlatos.
Welcome to the British Nursing Index (BNI) tutorial By the end of this tutorial you should be able to: Do a basic search to find references Use search.
1 How to find literature - A very short introduction SMED 8004 Medicine and Health Library October 2014.
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
1/28/2010 Network Plus Network Device Review. Physical Layer Devices Repeater –Repeats all signals or bits from one port to the other –Can be used extend.
Primary and Secondary Literature Finding good sources for research.
CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D.
Jessica Lavoie CSC 101 November 27, Societal Topics Weeks 7 and 8 Internet Regulation Internet regulation is restricting or controlling access to.
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
Basic Research Methods The “secret” –Build on the “magical” questions What’s the problem? Why’s the problem a problem? What’s the solution? Why’s the solution.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’™s in his book “The Cuckoo’s Egg” and by Bill Cheswick’€™s.
Project Selection And Needs Identification
Mac Book Please! WHY I NEED A MACBOOK AIR! Is a MacBook Air Safe? Has a lock screen Pick your own password and username If you type in the wrong password/userna.
Welcome to the Business Source Premier tutorial By the end of this tutorial you should be able to: Do a basic search to find references Use search techniques.
Literature Search Bill Barrett (originator) David W. Embley (editor)
Presented by Rebecca Meinhold But How Does the Internet Work?
Networks Part 3: Packet Paths + Wireshark NYU-Poly: HSWP Instructor: Mandy Galante.
Routing and Addressing
1 Manage your Research Articles : Using Mendeley & Zotero Winter Term 2012 Helen B. Josephine
Understanding Network Architecture CHAPTER FOUR. The Function of Access Methods The set of rules that defines how a computer puts data onto the network.
Project. Research Project Due: – Project report due Monday midnight Delayed a bit due to popular demand Can accept an even higher delay (Tuesday at noon)
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Lecture 17 Page 1 CS 236 Online Onion Routing Meant to handle issue of people knowing who you’re talking to Basic idea is to conceal sources and destinations.
P REPARING FOR THE OSSLT ( Ontario Secondary School Literacy Test )
Knocking on the Door of Research Suggestions on how to get started in research.
Networking Components Assignment 3 Corbin Watkins.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Successful Web searches!. If you type your keywords into Google, you’ll get millions of hits! Is that useful?
By: WenHao Wu. A current situation that I have is that I cannot decide if a computer career is for me. I am considering any career in computers, but I.
Finding, Reading, & Citing Scientific Papers. Types of scientific literature? Primary literature ~ current, specialized, with data research articles,
Interconnecting Cisco Networking Devices Part 1 Pass4sureusa Pass4sure.
Chapter 3.  Help you understand what hardware is required to allow networks to work including: ◦ Repeaters ◦ Hub ◦ Switch ◦ Bridge ◦ Gateway (not needed.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
CS4241: Webware Class 25: A Few Short Topics Web Security 1 Copyright , Michael J. Ciaraldi.
1 ACCESSING THE PURDUE LIBRARY DATABASES AND ONLINE JOURNALS September 14, 2006.
740: Computer Architecture Project Proposal and Topics Prof. Onur Mutlu Carnegie Mellon University Fall 2013.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.
FIRST YEAR ASSISTANT PROFESSOR WORKSHOP ALUMNI CENTER BALLROOM MAY 5, 2016 Finding Funding Beth Hodges Director, Office of Proposal Development.
Please take out the homework - viewing sheet fro the movie
How does a person read and use an Academic Paper?
Routers and Redundancy
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
ProQuest مجموعه‌ای از پایگاه‌های اطلاعاتی است که شامل پایان‌نامه‌ها، سخنرانی‌ها، مقالات، نشریات علمی، گزارش‌ها و فیلم‌ها می‌باشد. این مجموعه، اطلاعاتی.
With specific reference to the proposal submitted for AI
Outline Using cryptography in networks IPSec SSL and TLS.
Reference Management and Knowledge Organization
Outline The spoofing problem Approaches to handle spoofing
Presentation transcript:

CS 525 – Network Security Literature Reviews, LaTeX, and Starting a Proposal

Literature Review How to start? –Google Scholar Firefox add-on to add to search bar Works hard to give you a PDF Has an “Import into BibTeX” option – And then? –Act like a Web crawler Take promising documents, look at who it cites and who it is cited by to find other relevant documents –As you learn relevant jargon/key words, search for those as well and iterate

Literature Review – Continued Use abstracts, tables, figures, intros, and conclusions to find related works. When do I stop? –When you seem to have exhausted the most closely related work No new relevant citations (or cited by) from any of the papers you have found No new useful keywords to search When it seems like you have a full mesh

Literature Review – FAQ What if nothing is related? –You need to be more liberal in your view of “related” If you squint, maybe X or Y is somewhat close –Eventually, it all comes back to seminal works in networking in the end –People hopefully have not done exactly what you’re doing, but you got your ideas from somewhere

Tools of the Trade LaTeX –Emacs does okay –TeXShop on Mac is pretty reasonable –Linux tools also exist for common macros BibTeX –Emacs has a BibTeX environment. It’s meh. –BibDesk on Mac is awesome. Tried KBibDesk port on Linux, was underwhelmed –Not as familiar with good Linux tools

LaTeX Tutorial This is an example of how I do things and some of the cool stuff LaTeX can do. Some of you have tried LaTeX now –Any tips? Tools that work well?

Let’s do a Proposal

The Heilmeier Catechism –What are you trying to do? Articulate your objectives using absolutely no jargon. –How is it done today, and what are the limits of current practice? –What's new in your approach and why do you think it will be successful? –Who cares? If you're successful, what difference will it make? –What are the risks and the payoffs? –How much will it cost? How long will it take? –What are the midterm and final "exams" to check for success?

Catechism – 1 What are you trying to do? Articulate your objectives using absolutely no jargon. –Computers communicate through networks in small groups of information. Special Internet devices direct these groups of information from the source to the destination. Unfortunately, these devices can be attacked, causing them to misdirect information. This can be used to spy on users, make some destinations unavailable, or to forge identities.

Catechism – 2 How is it done today, and what are the limits of current practice? –At this point, nobody tries to prevent these attacks. They simply trust everyone involved to not attack them. Unfortunately, this trust is sometimes betrayed, leading to outages or intentional communication interceptions. What's new in your approach and why do you think it will be successful? –I am going to apply advanced mathematics, called cryptography, to the protocol to allow me to secure the network. This will give me evidence that the requests are valid. I think I will be successful because such an approach was successful for securing Web traffic and my needs are similar.

Catechism – 3 Who cares? If you're successful, what difference will it make? –All Internet users will care. It will make attacks less likely to succeed and ensure information travels along the intended paths. What are the risks and the payoffs? –The cryptography I will use is heavy-weight and can slow down the devices responsible for directing traffic. This may be infeasible in practice. However, if it succeeds, we can prevent many attacks.

Catechism – 4 How much will it cost? How long will it take? –I don’t have to answer this. What are the midterm and final "exams" to check for success? –I will try to implement it on a device and see if it works for that device. I will monitor the amount of time required to send information. If the time is over 50% more, it will be too costly to use. –My final exam will be to use multiple routers and examine the end-to-end delays from the approach. If the delay increases by more than a second, it will be too high to be usable.