Download presentation
Presentation is loading. Please wait.
Published byCoral Hutchinson Modified over 9 years ago
1
Information Assurance Research and Training at Iowa State University (ISU) Johnny Wong Information Assurance Center (IAC) www.iac.iastate.edu Information Assurance Center www.iac.iastate.edu
2
Iowa State University: Birthplace of the Digital Computer Professor John Vincent Atanasoff Atanasoff-Berry Computer
3
ISU Information 150 Years old 23 rd in number of patents 2 nd among universities in R&D 100 Awards 28,000 students –22,500 undergrads, 5,000 graduate students, 500 professional students 3 I/U CRC centers (PSERC, CNDE, CIP) Over $300 million in sponsored funding
4
A partnership between industry, academia, and government working today to solve the security problems of tomorrow
5
Center for Information Protection ISU is certified as NSA Center of Academic Excellence (CAE) in IA both in Education (Year 1999) and Research (Year 2009), a chartered CAE school. An NSF I/U CRC with a focus on information protection The need for information protection is well documented Primary mission is to create a linkage between security research and organizations providing the critical cyber infrastructure.
6
ISU Industrial Members Boeing Iowa DOT John Deere Union Pacific Railroad Palisade Systems
7
Funded Projects (2006) Evaluation of learning Algorithms for Egress Filtering DILON: Detecting Intrusions at Layer One SAVANT: Security Analysis using Visualization of Network Topology Integrating Process Modeling with IT Audit Control Systems for Regulatory Compliance Secure and Dependable Information Delivery in Wireless Ad Hoc and Sensor Networks Intrusion Detection in Wireless Ad Hoc Networks Specification-guided Misuse and Anomaly Intrusion Detection
8
Funded Projects (2007) From Reality to Security Testbeds Bootstrapping trust in Service-Oriented Architectures Identity Theft Awareness Research, Evaluation and Education Delivery Intrusion Detection & Response Systems Security & Privacy Mechanisms for Wireless Mesh Networks Architectural Approaches to Embedded Program Flow Protection Identity Disclosure Protection: A Data Reconstruction Approach for Preserving Privacy in Data Mining
9
Funded Projects (2008) Privacy-Preserving Reasoning Formal Approach for Intrusion Detection and Response Systems Modeling Secure Web Services with AADL (Architecture Analysis & Design Language) ID Theft Awareness Research, Evaluation, and Education Delivery Modeling Paradigms for Security and Dependability in Policy-based Systems Acceleration and Efficiency Exploration of Cryptographic Kernels on Multi-Core Processing Platforms
10
Funded Projects (2009) Tamper-proof and Privacy Preserving Schemes for Smart Cards Secrecy-Preserving Reasoning Response to Collaborative Attacks against Network Vulnerability ISEAGE Test-bed usage
11
Information Assurance (IA) Training at ISU Multidisciplinary Research Program (25 faculty) Graduate education –Masters of Science in Information Assurance (70 students ½ off campus) –MS programs specializing in IA in: CprE, CS, Math, PolySci, and MIS –PhD programs specializing in IA: CprE and CS –Graduate Certificate Program Major Lab Facilities Outreach efforts: seminars and short courses to state agencies and industry; security awareness integrated in other curricula; significant inter-University projects
12
IA Courses CprE 530: Computer Network Protocols CprE 531: Computer System Security CprE 532:Information Warfare CprE/533:Cryptography CprE 534:Legal & Ethical Issues in Security CprE 535:Data Hiding CprE 536:Computer and Network Forensics CprE 537:Security in Wireless Communications CprE 632:Capstone course in IA ComS 586:Advanced Network Architectures ComS 552:Operating Systems: Advanced Concepts
13
Faculty Research Areas Computer Engineering and Computer Science Security of wireless systems; data mining; mobile agents, DoS attacks; steganography; vulnerability taxonomies; intelligent agents; AI applied to IDS; privacy and anominity; trace back of attacks; battlefield mobile tactical wireless networks; privacy-preserving access of tactical sensor networks; privacy-preserving authentication and access control techniques for smart card; computer security curriculum development Management Information Systems Fraud and audit management; intrusion detection; computer networks, E- Commerce Political Science IT budgeting; criminal justice; science & technology public policy; politics of technology change; Cyber politics; constitutional law, ethics, and public policy Mathematics Cryptography College of Education Leadership training; faculty in-service program (Project LEARN)
14
IAC Labs ISEAGE SNAIR INS Lab Cyber Crime Lab Cyberspace Forensics
15
Creation of a simulated Internet for researching, designing, and testing cyber defense mechanisms Allow real attacks to be played out against systems Staff trained on both attack and defense methods
16
Uses of ISEAGE Security System Modeling Cyber Physical modeling Cyber Infrastructure modeling Education and Training Research Outreach –Cyber Defense Competitions
17
CIP Access to ISEAGE Product testing using ISEAGE network testbed ISEAGE students perform the testing Member companies propose the product types to be tested and any specific test criteria Distribution of results will be limited to CIP members unless the members decide to release the findings
18
SNAIR SNAIR: Securing Networks through Attribution & Intrusion Research Lab Faculty –Thomas E. Daniels, Director –Julie Dickerson, Yong Guan, Steve Russell, Mani Mina A laboratory in the ISU Information Assurance Center Affiliate of the ISU High Speed Systems Engineering Lab Equipment –3 Mobile network testbeds for network attribution –Sun POD Cluster –40+ PC’s –0.5 TB Data Server –Office space for 10 full time research assistants –Dedicated private firewalled network
19
INS INS: Innovative Networking and Systems Lab Faculty –Johnny Wong, Wensheng Zhang, Ying Cai, Wallapak Tavanapong, Andrew Miner, Luan Lu, Carl Chang, Hen-I Yang A laboratory in the ISU Computer Science Department Affiliate with the ISU CCILD (Center for Computational Intelligence, Learning and Discovery, led by Professor Vasant Honavar) Equipment –Wireless Mobile ad hoc network test-beds –Smart Home facilities –Wireless Sensor Networks facilities –Multiple sensors and actuators devices –50+ PC’s –Office space for 20 full time undergraduate and graduate research assistants
20
Outreach Efforts Numerous talks on security Short courses & workshops Cyber defense competitions –College –Community colleges High school outreach –Cyber defense –Robotics & Games design –IT-Adventures (www.it-adventures.org)
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.