Download presentation
Presentation is loading. Please wait.
Published byCameron Pitts Modified over 9 years ago
1
Adv. Network Security How to Conduct Research in Network Security
2
Background Infosec Fundamentals –Crypto. hash functions Properties –Symmetric key crypto. How it is used –Public key crypto. How it is used Possibly: basic number theory –General infosec requirements Standard Attacks
3
Class Goals Research –How to find problems/ideas –How to identify good solutions –How to evaluate solutions –How to present the work Network Security Research –Specific Problems –Specific Tools, Technologies, Methods –Attacks
4
Grading Final Project: 50% –Pre-project report: 15% –Pre-project presentation: 5% –Final project report: 25% –Final project presentation: 5% Paper Presentations: 20% Homeworks:30%
5
Final Project Purpose –Demonstrate ability to do original research Stages –1. Choosing the project –2. Create a direction & a testable idea Pre-project proposal due March 10th. –3. Experiment/Develop –4. Present Final report due on May 5th.
6
Final Project Project idea –Originality/Creativity is it interesting and novel? –Value is it a useful contribution? Methodology –Correctness does it test the right thing? –Depth is it a thorough investigation?
7
Final Project Experiment –Did it work? –How do you adapt?/future work Presentation –Highlighting key contributions –Clear presentation of results –Understanding of the related work
8
Paper Presentations Purpose –Develop Presentation Skills –Deeply understand a subset of the papers Paper Choice –We’ll discuss topics together as a class –I will choose most/all papers –Students can choose dates (e.g., which papers)
9
Paper Presentations Time –40 minutes Grading –50% other students –50% me Criteria –Highlight key contributions in light of related work –Clarity, Preparation, Depth of understanding
10
Homeworks Purpose –Directed study of the papers –Create discussion points for class Due –Every class –If not there in person, lose a point Still due within 1 week –3 pts. scale 0 - no good, 1 - weak, 2 - usual, 3 - very good
11
Possible Topics BGP Security –Leap Frog –Aggregated Path Authentication
12
Possible Topics Automated Trust Negotiation –Using Cryptographic Credentials –Attribute Information Leakage
13
Possible Topics P2P Security –Redundancy is cost-ineffective –Secure Publish-Subscribe Overlay –Applications of Secure E-Voting to Automated Privacy-Preserving Troubleshooting –Secure Collaboration
14
Possible Topics New Attacks –Misbehaving TCP Receivers –Fast Dictionary Attacks –Exploiting Open functionality in SMS –Mapping Internet Sensors –Vuln. of Passive Internet Monitors
15
Possible Topics Worms –Deriving Unknown Vulnerabilities Zero-day exploits –Effectiveness of Dist. Worm Monitoring –Polygraph: Sig. Generation –Worm Origin ID Using Random Moonwalks
16
Possible Topics DDoS Prevention –Stateless Multipath Overlays –Empirical Study of DOS attacks
17
Possible Topics Reputation –Anomaly Detection –A Framework... History-based Access Control
18
Possible Topics Key Management –Dynamic and Efficient... Access Hierarchies –Modeling Insider Attacks
19
Possible Topics Anonymity & Timing Attacks –Tracking VoIP Calls –Flooding attack on Tor –Improving Brumley and Boneh (SSH)
20
Possible Topics RFID –Untraceable RFID Tags –Security analysis of a device
21
Possible Topics e-Voting –Cryptographic Voting Protocols: Systems Perspective –Analysis of a e-Voting System (Diebold)
22
Possible Topics NIDS & Network Defense –Fast and Automated Gen. of Attack Sigs –Gen. Semantic Aware Sigs (2) –MulVAL: Netsec analyzer –Shadow Honeypots –Language-based gen. –Automaton Inlining
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.