Secure & Asymmetric Approach for Designing FUTURE INTERNET Presented by Md. Obaidur Rahman Networking Lab, Department of Computer Engineering, Kyung Hee.

Slides:



Advertisements
Similar presentations
Kilnam Chon Keio & KAIST GENI(Global Environment for Network Innovations) has been handled with good system engineering, NSF style.
Advertisements

Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
The Shapes of Computers Today
School of Engineering & Technology Computer Architecture Pipeline.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
Network and Business Communications. Use of network and internet Military(1969) Education (1960s, 1970s and 1980s) Open to public ( ) Use of the.
© Siemens AG 2001 Software & Systems Architectures - Mobile Computing Proposed Research Topics Cooperation between Siemens and UCB March 27, 2001 Visit.
Introduction to Computers. Michael R. Izzo
E-commerce security by Asif Dalwai Introduction E-commerce applications Threats in e-commerce applications Measures to handle threats Incorporate.
Masters in Information Science and Technology (IST) Thesis and Non-Thesis Option (30 Credits)
Chapter 1: Overview Lecturer: Alias Mohd Telecommunications Department Faculty of Electrical Engineering UTM SET 4573: Data Communication and Switching.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
OpenFlow-Based Server Load Balancing GoneWild Author : Richard Wang, Dana Butnariu, Jennifer Rexford Publisher : Hot-ICE'11 Proceedings of the 11th USENIX.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Wireless and Security CSCI 5857: Encoding and Encryption.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Support Services & IP Multimedia Subsystem (IMS)
Tablets Laptops PDAs Smart Phones Mobile Commerce &Wireless Network.
Web-based E-commerce Architecture
Electronic Business. What is Electronic Business? It is defined as ICT (Information and Communication Technologies) application with support to all business.
SECURITY Bart Vansevenant  Who is who?  Who can read what?  Traces  Virusses  Safety and confidentiality.
Steve Wicker Cornell University 1 TRUST Autumn 2011 Conference.
Page 1 of 9 NFS Vendors Conference October 25, 2000 PC Solutions to Network File Systems.
CAEN Wireless Network College of Engineering University of Michigan October 16, 2003 Dan Maletta.
Public Health Data Standards Consortium
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
Kaspersky Labs 6 ht Annual Partner Conference · Turkey, June Kaspersky Labs 6 th Annual Partner Conference · Turkey, 2-6 June 2004 November 16.
Chapter 17 THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition Chapter Using Technology to Manage.
Windows Server 2003 with Active Directory and Group Policies Wendy Hurst Eastern Kentucky University Department of Technology CEN/CET.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
CU – Boulder Security Incidents Jon Giltner. Our Challenge.
Secui.com Goh, Kyeongwon Secui.com Goh, Kyeongwon GRID Security Infrastructure
Institute for Security Technology Studies Dartmouth College Digital Living 2010: Sensors, Privacy, and Trust David Kotz September 2005.
Virtual Storage in Future Internet Database Lab. Kyung Hee University. Ding Jinghua
1 /10 Pascal URIEN, IETF 76 th, Monday November 9 th Hiroshima Japan draft-urien-hip-iot-00.txt HIP support for RFID
The Information Technology Act Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B B2C B2C EDI EDI Internet, Intranet, Extranet Internet,
Computer Science and Engineering - University of Notre Dame Jimmy Neutron CSE 40827/60827 – Ubiquitous Computing December 9, 2009 Project Presentation.
VoIP in Disaster & Emergency Response Voice over IP In Disaster and Emergency Response Project Name:
Understand Internet Security LESSON Security Fundamentals.
Early Detection of DDoS Attacks against SDN Controllers
Firewall Technology and InterCell Communication Peter T. Dinsmore Trusted Information Systems Network Associates Inc 3060 Washington Rd (Rt. 97) Glenwood,
Making a History of the Internet in South Korea : A Users' Perspective Myungkoo Kang Professor of Communication Studies College of Social Sciences Seoul.
Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Security aspects.
Java Mobile Agents with Aglets End of studies report Responsible : M. Logothetis ERASMUS Exchange.
1 / 21 Providing Differentiated Services from an Internet Server Xiangping Chen and Prasant Mohapatra Dept. of Computer Science and Engineering Michigan.
LOP_RE: Range Encoding for Low Power Packet Classification Author: Xin He, Jorgen Peddersen and Sri Parameswaran Conference : IEEE 34th Conference on Local.
Introduction to Networking. What is a Network? Discuss in groups.
Network Requirements Analysis CPIT 375 Data Network Designing and Evaluation.
Dr. Pipat Sookavatana. IT for Business Communication and Information Exchange Web access File and Printer Sharing Information Access Advertisement.
Internet Security TEAMS March 18 th, ISP:Internet Service Provider.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Fourth ICT Security Conference 2017
Direct Deposit Phishing Attack
KYUNG HEE UNIVERSITY, KOREA
Computers Are Your Future
Seminar On Computer Networks
The Shapes of Computers Today
Blockchain Technology and IoT Security Andy Wang March 21, 2018
Planet Lab Demo IP Address Map
Delivering Distance Learning Experiments in Local Area Networking
Net 412 (Practical Part) Networks and Communication Department LAB 1.
Energy-Efficient Storage Systems
How to install hotspot server in stand-alone pc
Read this to find out how the internet works!
The Shapes of Computers Today
Presentation transcript:

Secure & Asymmetric Approach for Designing FUTURE INTERNET Presented by Md. Obaidur Rahman Networking Lab, Department of Computer Engineering, Kyung Hee University.

Future Internet Proposal Current Internet can be categorized in to two parts from the designing point of view:  Designed for research: TRUSTED SYSTEMS  Designed for E-Commerce: UNTRUSTED SYSTEMS

Future Internet Proposal In current Internet all the control and management information are handled in the same approach like for DATA exchanging Security Issues comes: Virus, Spam, Privacy etc. Current Internet Systems can not differentiate between a less important PC, Laptop or PDA with a very important server. It gives symmetrical service with the help of IP. Typically it should be prioritized.

References Raj Jain, "Internet 3.0: Ten Problems with Current Internet Architecture and Solutions for the Next Generation," Military Communications Conference, Washington, DC, October , 2006,

Thank You