Download presentation
Presentation is loading. Please wait.
Published bySharlene Eaton Modified over 9 years ago
1
Senior Project Ideas: Blind Communication & Internet Measurements Mehmet H. Gunes
2
P1 A1 P2 A2 Domain-A Domain-C P3 C1 Blind Communication What if you wanted to send a message to a system, but did not want anyone to see it. Multi-owner systems, Distributed collaboration tools, Cloud computing, … 2
3
Trusted Platform Module 3 Broadcom Asus
4
Cryptographic Processor Random number generator RSA key generator SHA-1 hash generator Encryption/decryption& signature engine Persistent Memory Endorsement Key (EK) Storage Root Key (SRK) Versatile Memory Platform Configuration Registers (PCR) Attestation Identity Keys (AIK) Storage Keys Secured Input / Output Trusted Platform Module 4
5
PERSEUS security kernel 5 Hardware Layer Resource Management Layer Trusted Software Layer Legacy O.S. App Legacy O.S. App Critical Application Configuration Application Layer Security Kernel TC support http://www.perseus-os.org
6
6 Web of interconnected networks Grows with no central authority Autonomous Systems optimize local communication efficiency The building blocks are engineered and studied in depth Global entity has not been characterized Internet
7
Need for Internet measurements arises due to commercial, social, and technical issues Realistic simulation environment for developed products, Improve network management Robustness with respect to failures/attacks Comprehend spreading of worms/viruses Know social trends in Internet use Scientific discovery Scale-free (power-law), Small-world, Rich-club, Dissasortativity,… Internet Measurements 7
8
Internet Topology Measurement 8 CAIDA 2006
9
Internet Topology Measurement 9 CAIDA 2006
10
Internet Topology Measurement 10 CAIDA 2006
11
Autonomous System Level Mapping 11 Historical
12
Autonomous System Level Mapping 12
13
Traffic Measurements Monitoring and measuring network traffic to produce better models of network behavior to diagnose failures and detect anomalies to defend against unwanted traffic PlanetLab 13
14
Code-Red Worm On July 19, 2001, more than 359,000 computers connected to the Internet were infected with the Code-Red (CRv2) worm in less than 14 hours Spread 14
15
Sapphire Worm was the fastest computer worm in history doubled in size every 8.5 seconds infected more than 90 percent of vulnerable hosts within 10 minutes. 15
16
Witty Worm reached its peak activity after approximately 45 minutes at which point the majority of vulnerable hosts had been infected World USA 16
17
Nyxem Email Virus Estimate of total number of infected computers is between 470K and 945K At least 45K of the infected computers were also compromised by other forms of spyware or botware Spread 17
18
Scam Hosting Study dynamics of scam hosting infrastructure 18
19
Internet Measurements The Internet is man-made, so why do we need to measure it? Because we still don’t really understand it Sometimes things go wrong Malicious users Measurement for network operations Detecting and diagnosing problems What-if analysis of future changes Measurement for scientific discovery Creating accurate models that represent reality Identifying new features and phenomena 19
20
Questions ? 20
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.