Presentation is loading. Please wait.

Presentation is loading. Please wait.

Sample of Data Security and Knowledge Discovery Research at the University of Texas at Dallas Dr. Bhavani Thuraisingham Dr. Latifur Khan Dr. Murat Kantarcioglu.

Similar presentations


Presentation on theme: "Sample of Data Security and Knowledge Discovery Research at the University of Texas at Dallas Dr. Bhavani Thuraisingham Dr. Latifur Khan Dr. Murat Kantarcioglu."— Presentation transcript:

1 Sample of Data Security and Knowledge Discovery Research at the University of Texas at Dallas Dr. Bhavani Thuraisingham Dr. Latifur Khan Dr. Murat Kantarcioglu Dr. Kevin Hamlen September 20, 2007

2 2 11/18/2015 22:10 Outline 0 Data and Applications Security - Information sharing, Geospatial data management, Surveillance, Secure web services, Privacy, Dependable information management, Intrusion detection 0 Data Mining an d Knowledge Discovery - Data Mining for Security Applications, Data Mining for Bioinformatics, Data Mining for Data and Software Quality

3 3 11/18/2015 22:10 Research Group: Data and Applications Security 0 Core Group -Prof. Bhavai Thuraisingham (Professor & Director, Cyber Security Research Center) -Prof. Latifur Khan (Director, Data Mining Laboratory) -Prof. Murat Kantarcioglu (Joined Fall 2005, PhD. Purdue) -Prof. Kevin Hamlen (Peer to Peer systems Security, Joined 2006 from Cornell U.) 0 Students and Funding -Over 20 PhD Students, 40 MS students (combined) -Research grants Air Force Office of Scientific Research NSF, NGA, Raytheon, - - - -

4 4 11/18/2015 22:10 Vision 1: Assured Information Sharing Publish Data/Policy Component Data/Policy for Agency A Data/Policy for Coalition Publish Data/Policy Component Data/Policy for Agency C Component Data/Policy for Agency B Publish Data/Policy 1.Friendly partners 2.Semi-honest partners 3.Untrustworthy partners Research funded by two grants from AFOSR

5 5 11/18/2015 22:10 Vision 2: Secure Geospatial Data Management Data Source A Data Source B Data Source C SECURITY/ QUALITY Semantic Metadata Extraction Decision Centric Fusion Geospatial data interoperability through web services Geospatial data mining Geospatial semantic web Tools for Analysts Research Supported by Raytheon on pne grant; working on robust prototypes on second grant

6 6 11/18/2015 22:10 Vision 3: Surveillance and Privacy Raw video surveillance data Face Detection and Face Derecognizing system Suspicious Event Detection System Manual Inspection of video data Comprehensive security report listing suspicious events and people detected Suspicious people found Suspicious events found Report of security personnel Faces of trusted people derecognized to preserve privacy

7 7 11/18/2015 22:10 Example Projects 0 Assured Information Sharing -Secure Semantic Web Technologies -Social Networks and game playing -Privacy Preserving Data Mining 0 Geospatial Data Management -Secure Geospatial semantic web -Geospatial data mining 0 Surveillance -Suspicious Event Detention -Privacy preserving Surveillance -Automatic Face Detection, RFID technologies 0 Cross Cutting Themes -Data Mining for Security Applications (e.g., Intrusion detection, Mining Arabic Documents); Dependable Information Management

8 8 11/18/2015 22:10 Social Networks 0 Individuals engaged in suspicious or undesirable behavior rarely act alone 0 We can infer than those associated with a person positively identified as suspicious have a high probability of being either: -Accomplices (participants in suspicious activity) -Witnesses (observers of suspicious activity) 0 Making these assumptions, we create a context of association between users of a communication network

9 9 11/18/2015 22:10 Privacy Preserving Data Mining 0 Prevent useful results from mining -Introduce “cover stories” to give “false” results -Only make a sample of data available so that an adversary is unable to come up with useful rules and predictive functions 0 Randomization and Perturbation -Introduce random values into the data and/or results -Challenge is to introduce random values without significantly affecting the data mining results -Give range of values for results instead of exact values 0 Secure Multi-party Computation -Each party knows its own inputs; encryption techniques used to compute final results

10 10 11/18/2015 22:10 Framework for Geospatial Data Security

11 11 11/18/2015 22:10 Data Mining for Surveillance 0 We define an event representation measure based on low-level features 0 This allows us to define “normal” and “suspicious” behavior and classify events in unlabeled video sequences appropriately 0 A visualization tool can then be used to enable more efficient browsing of video data

12 12 11/18/2015 22:10 Data Mining for Intrusion Detection / Worm Detection Training Data Classification Hierarchical Clustering (DGSOT) Testing Testing Data SVM Class Training DGSOT: Dynamically growing self organizing tree SVM: Support Vector Machine

13 13 11/18/2015 22:10 Intrusion Detection: Results Training Time, FP and FN Rates of Various Methods Methods Average Accuracy Total Training Time Average FP Rate (%) Average FN Rate (%) Random Selection52%0.44 hours4047 Pure SVM57.6%17.34 hours35.542 SVM+Rocchio Bundling 51.6%26.7 hours44.248 SVM + DGSOT69.8%13.18 hours37.829.8

14 14 11/18/2015 22:10 Information Assurance Education  Current Courses  Introduction to Information Security: Prof. Sha  Trustworthy Computing: Prof. Sha  Cryptography: Profs. Sudborough, Murat  Information Assurance: Prof. Yen  Data and Applications Security: Prof. Bhavani Thuraisingham  Biometrics: Prof. Bhavani  Privacy: Prof. Murat Kantarcioglu  Secure Language, prof. Kevin Hamlen  Digital Forensics: Prof. Bhavani Thuraisingham  Future Courses  Network Security: Profs. Ventatesan, Sarac  Security Engineering: Profs. Bastani, Cooper  Intrusion Detection: Profs. Khan, Thuraisingham  Digital Watermarking: Prof. Prabhakaran  Courses at AFCEA and AF Bases  Knowledge Management, Data Mining for Counter-terrorism, Data Security, preparing a course on SOA and NCES with Prof. Alex Levis - GMU and Prof. Hal Sorenson - UCSD)

15 15 11/18/2015 22:10 Knowledge Discovery in Images 0 Goal: Find unusual changes Process: -Use data mining to model normal differences between images -Find places where differences don’t match model 0 Questions to be answered: -What are the right mining techniques? -Can we get useful results?

16 16 11/18/2015 22:10 Change Detection: 0 Trained Neural Network to predict “new” pixel from “old” pixel -Neural Networks good for multidimensional continuous data -Multiple nets gives range of “expected values” 0 Identified pixels where actual value substantially outside range of expected values -Anomaly if three or more bands (of seven) out of range 0 Identified groups of anomalous pixels

17 17 11/18/2015 22:10 Multimedia/Image Mining Images Segments Blob-tokens Automatically annotate images then retrieve based on the textual annotations.

18 18 11/18/2015 22:10 Web Page Prediction: Problem Description ? Financial Aid Information (P3) Office of admission (P1) VIP web page (P2) What page is Next??

19 19 11/18/2015 22:10 Web Page Prediction: Architecture User session s Markov Model Dempster’s Rule Feature Extraction SVM Sigmoid mapping SVM output ANN Sigmoid mapping ANN output Markov prediction SVM prediction ANN Prediction fusion Final Prediction

20 20 11/18/2015 22:10 Misuse/Misinformation/ Insider threat 0 %50 of corporate breaches or losses of information that were made public in the past year were insider attacks 0 %50 of those insider attacks were the thefts of information by employees 0 It is hard to model individuals!!! 0 Role based access control provides tools to model given roles 0 Challenge: How to develop models for predicting normal usage of a role vs misuse? 0 Challenge: How to integrate misuse, auditing and access control systems? 0 Current Status: We are developing misuse detection system based on clustering; Risk-based analysis

21 21 11/18/2015 22:10 Time Constrained KDD: Proposal to AFOSR with UIUC 0 The military must continually carry out the followed operations: -Surveillance: monitor the behavior of the people or objects to see if they are deviating from the norm; Maneuver – Place the enemy in a position of disadvantage through the flexible application of combat power; Mass: the effects of overwhelming combat power at the decisive place and time; Attack: an attempt to actively strike at the enemy, as opposed to a defensive plan. 0 Track the enemy and DETER him during surveillance and maneuver stage through -Knowledge Discovery: Extract concepts from the stream data arriving from the sensors; Time Constrained Activity Analysis: Extract knowledge from the enemy activities arriving in the form of streams; Ontology Management: Develop ontologies and subsequently conduct multi-modal data analysis of the multimedia data captured and resolve conflicts and uncertainty; Resource Allocation: Utilize the knowledge discovered, apply decision theories and determine resource allocation

22 22 11/18/2015 22:10 Some Experiences with Tools 0 Tools developed in-house -Image mining tool, Data Sharing Tool, -Intrusion detection/Malicious code detection tools, Web page prediction tool -Multimedia mining/Image extraction including MPEG7 feature descriptors -Cluster visualization tool 0 External tools -Oracle data mining product -IDIS data mining tool -WEKA data mining tool -XML SPIE and QUIP -INTEL OpenCV

23 23 11/18/2015 22:10 Technical and Professional Accomplishments  Publications of research in top journals and conferences, books IEEE Transactions, ACM Transactions, 8 books published and 2 books in preparation including one on UTD research (Data Mining Applications, Awad, Khan and Thuraisingham)  Member of Editorial Boards/Editor in Chief Journal of Computer Security, ACM Transactions on Information and Systems Security, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Knowledge and Data Engineering, Computer Standards and Interfaces - - -  Advisory Boards / Memberships/Other Purdue University CS Department, Invitations to write articles in Encyclopedia Britannica on data mining, Keynote addresses, Talks at DFW NAFTA and Chamber of Commerce, Commercialization discussions of data mining tools for security  Awards and Fellowships IEEE Fellow, AAAS Fellow, BCS Fellow, IEEE Technical Achievement Award, IEEE Senior Member

24 24 11/18/2015 22:10 Our Model: R&D, Technology Transfer Standardization and Commercialization  Basic Research (6-1 Type) Funding agencies such as NSF, AFOSR, NGA, - - - -, etc. ; Publish our research in top journals (ACM and IEEE Transactions)  Applied Research Some federal funding (e.g., from government programs) and Commercial Corporations (e.g., Raytheon); Our current collaboration with AFRL-ARL  Technology Transfer / Development Work with corporations such as Raytheon to showcase our research to sponsors (e.g., GEOINT) and transfer research to operational programs such as DCGS  Standardization Our collaborations with OGC, OASIS and standardization of our research (e.g., GRDF)  Commercialization Patents, Work with VCs, Corporations, SBIR, STTR for commercialization of our tools (e.g., our work on data mining tools)

25 25 11/18/2015 22:10 Our Vision for Assured Information Sharing/KDD Time constrained KDD (Future) Link Analysis (AFOSR, Texas) Game Theory (AFOSR Dependable Information Management (Texas) Misinformation/ Misuse (AFOSR) Geospatial (NGA, Raytheon) Semantic Web (NSF, AFOSR) Incentive based Knowledge management (Future) Assured Information Sharing/KDD Privacy Preserving data mining (Texas) Technologies will contribute to Assured Information Sharing

26 26 11/18/2015 22:10 Our Collaborations in Assured Information Sharing and KDD Time Constrained KDD (UIUC) Link Analysis (UGA, UAZ) Game Theory (UTD Management School) Dependable Information Management (UCR, UTSA) Misinformation/ Misuse (Purdue) Geospatial (UMN, UCD, Purdue, WVU, UCF) Semantic Web (UMBC, UTSA) Knowledge management (SUNY Buffalo) Assured Information Sharing/KDD Privacy Preserving data mining (Purdue)


Download ppt "Sample of Data Security and Knowledge Discovery Research at the University of Texas at Dallas Dr. Bhavani Thuraisingham Dr. Latifur Khan Dr. Murat Kantarcioglu."

Similar presentations


Ads by Google