Practically Useful Network Security Chin-Tser Huang University of South Carolina.

Slides:



Advertisements
Similar presentations
Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Advertisements

Network Support for Accountability Nick Feamster Georgia Tech Collaborative Response with David Andersen (CMU), Hari Balakrishnan (MIT), Scott Shenker.
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Secure Routing in Ad Hoc Wireless Networks
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
NETWORK SECURITY.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
By: Paul Albert.  Project Description  Design Protocols  User Profiles  Deliverables  Timeline  Budget  Demonstration  Conclusion.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
BotNet Detection Techniques By Shreyas Sali
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
GrIDS -- A Graph Based Intrusion Detection System For Large Networks Paper by S. Staniford-Chen et. al.
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CSC8320. Outline Content from the book Recent Work Future Work.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
MAANAS GODUGUNUR SHASHANK PARAB SAMPADA KARANDIKAR.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
Module 11: Designing Security for Network Perimeters.
Ad Hoc Network.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
1 Company Confidential Fluke Networks OptiView Wireless Network Analyzer Bringing the power of OptiView to Wireless LANS.
Yan Chen Dept. of Electrical Engineering and Computer Science Northwestern University Spring Review 2008 Award # : FA Intrusion Detection.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Some Great Open Source Intrusion Detection Systems (IDSs)
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Network Security Basics: Malware and Attacks
Instructor Materials Chapter 7 Network Security
Secure Software Confidentiality Integrity Data Security Authentication
School of Electrical and Computer Engineering
Northwestern Lab for Internet and Security Technology (LIST) Yan Chen Department of Computer Science Northwestern University.
ISMS Information Security Management System
Mobile ad hoc networking: imperatives and challenges
CSCE 715: Network Systems Security
CSCE 715: Network Systems Security
Albeado - Enabling Smart Energy
Presentation transcript:

Practically Useful Network Security Chin-Tser Huang University of South Carolina

1/8/20102 Security Services Confidentiality Integrity Authentication Anti-replay … Availability Access control Non-repudiation Anonymity

1/8/20103 Network Security Always Good? What if security mechanism is not applied correctly?

1/8/20104 Network Security Always Good? What if security mechanism is not applied appropriately? xy AES k3 (3DES k1,k2 (m, ts)) 3DES k1,k2 (m, ts)m, ts

1/8/20105 Practically Useful Network Security To make network security practically useful, we need to Verify the correctness of security mechanism Consider the efficiency of security mechanism

1/8/20106 Protocol Design and Verification Correctness is essential for secure protocols Two steps to verify correctness of protocols First specify protocols using a formal and scalable notation Then verify correctness of protocol using state transition diagram

1/8/20107 Abstract Protocol Notation

1/8/20108 State Transition Diagram

1/8/20109 Botnet Detection and Mitigation Supported by NSF and AFRL Ongoing collaboration with Dr. Han at AFRL Botnet is a distributed network of a large number of bots, which are machines infected with malware and under the control of a botmaster

1/8/ Botnet Detection and Mitigation Aim to mitigate the problem of botnets by filtering their malicious packets and command and control (C&C) packets early Successful implementation on Quagga routing software Currently developing Tcl/Tk scripts for automated rule dissemination between routers With Prasanth Kalakota, Mohamed Sharaf and Dr. Matthews

1/8/ Early Filtering Testbed Four Cisco 2811 routers Dell PowerEdge R410 server

1/8/ Intrusion Detection Supported by a DARPA/AFRL grant Microscope View network as a collection of individual hosts Charge individual host for anomalous behavior With Jeff Janies A BC D

1/8/ Intrusion Detection Macroscope View network traffic as time-series signal Use wavelets to capture different types of anomalies With Sachin Thareja

1/8/ Authentication in Wireless Networks Design secure unicasting protocol to counter routing level attacks in ad hoc sensor networks Develop dual authentication protocol against rogue access points for WLANs Discover and fix security problems in WiMAX PKM protocols With Jeff Janies, Sen Xu, and Prof. Matthews

Privacy-Preserving Multi-Dimensional Credentialing Organizations often use common personal identifiers (PIs) to satisfy reporting obligations and uniquely identify the same individuals, thereby making it possible to cross-link and aggregate the transactions of the same person from multiple sources Introduce the veiled certificate (VC) which allows individuals to maintain control over their personal information while satisfying the regulatory and reporting needs of today’s security conscious environment With Prof. Gerdes 1/8/201015

1/8/ More Information Secure Protocol Implementation & Development (SPID) Group Website: