SMUHACNet 2005 Information Infrastructure for Border and Transportation Security Suku Nair.

Slides:



Advertisements
Similar presentations
An Overview of ABFT in cloud computing
Advertisements

Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Presenter : Stuart Stent Lecturer : Robert Dale Supervisor: Rajan Shankaran.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
URSA: Providing Ubiquitous and Robust Security Support for MANET
Gefördert durch das Kompetenzzentrenprogramm DI Alfred Wertner 19. September 2014 Ubiquitous Personal Computing © Know-Center Security.
1 Intrusion Tolerance for NEST Bruno Dutertre, Steven Cheung SRI International NEST 2 Kickoff Meeting November 4, 2002.
Chapter 1 – Introduction
Advanced Metering Infrastructure AMI Security Roadmap April 13, 2007.
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Issues In Sensor Networks By Priya Palanivelu.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Small Worlds and the Security of Ubiquitous Computing From : IEEE CNF Author : Harald Vogt Presented by Chen Shih Yu.
A Survey on Sensor Networks Rick Han CSCI 7143 Secure Sensor Networks Fall 2004.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
Applied Cryptography for Network Security
Henric Johnson1 Network Security /. 2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 張耕瑋 黃峻亨 楊銘鴻 李昌諭 吳政穎 陳建廷.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
SEC835 Database and Web application security Information Security Architecture.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
11 Canal Center Plaza, Alexandria, VA T F Enterprise Computing Conference (ECC) Workshop Alma R. Cole,
Computer Science and Engineering 1 Cloud ComputingSecurity.
1 Secure Ad-Hoc Network Eunjin Jung
Chapter 21 Distributed System Security Copyright © 2008.
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
Chapter 4 Application Level Security in Cellular Networks.
Security is not just… 1 A Compliance Exercise Certification and Accreditation FISMA.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
GRID ARCHITECTURE Chintan O.Patel. CS 551 Fall 2002 Workshop 1 Software Architectures 2 What is Grid ? "...a flexible, secure, coordinated resource- sharing.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Security in Computing Security in Networks. I.Threats in networks A. Vulnerabilities 1.Anonymity 2.Shared resources 3.Size (many points of attack) 4.Complexity.
Lecture 24 Wireless Network Security
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Azam Supervisor : Prof. Raj Jain
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Security Distributed Systems Lecture # 14. Why care about security? Authentication Use another person’s ID for sending Non-repudiation E-commerce.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Information Management System Ali Saeed Khan 29 th April, 2016.
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Intrusion Tolerant Architectures
Sarah Diesburg Operating Systems CS 3430
Detection and Analysis of Threats to the Energy Sector (DATES)
Broad Emerging Themes in CPS/IoT
AMI Security Roadmap April 13, 2007.
Computer Science and Engineering
Applying Policy-Based Intrusion Detection to SCADA Networks
An Overview of Security Issues in Sensor Network
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

SMUHACNet 2005 Information Infrastructure for Border and Transportation Security Suku Nair

SMUHACNet 2005 Research in HACNet Secure Information Infrastructure: This work involves several sub-areas of research –low-power algorithms to provide secure, non-repudiated communication amongst sensing devices which form a self-configuring mesh –Secure and ubiquitous access to information –Intrusion tolerance through detection and prevention of cyber attacks such as phishing, Distibuted Denial of Service (DDoS) –Threat prediction and attack trace-back –Restoration of network and computer systems after an attack or failure –Dependable architecture for secure grid-computing Application Security – Sub areas of this research include –Software security from design to implementation –Protocol validation Security Engineering - Research in this area involves –security engineering processes (such as application and extension of the Systems Security Engineering Capability Maturity Model, SSE-CMM)SSE-CMM –Enterprise security –Legal and ethical policy issues Nano-security

SMUHACNet 2005 Our View of Border and Transportation System

SMUHACNet 2005 Enablers for End-to-End System Integrity

SMUHACNet 2005 Security and Reliability in Sensor Networks Distributed authentication –Beyond SNEP, TESLA, and µTESLA –Key generation and distribution schemes –Authentication of reverse broadcast Confidentiality –Low cost encryption schemes using chaffing and winnowing based on FEC codes Self-organizing networks –Error detection/correction –Neighbor detection through Interactive Consistency (IC) –Reconfiguration schemes

SMUHACNet 2005 Threat Prediction Anomalies/Flags Data Collection and Cleansing EMM Data Mining All data Link Graph Construction N/W Analysis Growth/ Shrinkage Heuristics Recommendations Sequential Data Collection