Ppt on wireless sensor network security model using zero knowledge protocol

1 Mobile Ad Hoc Networks Nitin H. Vaidya Texas A&M University © 2000 Nitin Vaidya.

old location information, and knowledge of the destination’s speed/useful to let police and security guards know in advance what you are up to 206 BBN Implementation [Ramanathan00Wcnc]  Density and Asymmetric-Adaptive Wireless Network/protocols  Improving interaction between protocol layers  Distributed algorithms for MANET  QoS issues  Applications for MANET 227 Related Research Areas  Algorithms for dynamic networks (e.g., [Afek89])  Sensor networks [DARPA-SensIT]  Ad hoc network of sensors/


IIT Bombay Tracking Dynamic Phenomena: Sensor Networks to the Rescue Krithi Ramamritham Dept of Computer Sc. & Engg. Indian Institute of Technology Bombay.

): Some preliminary results,” in Intelligent Computing: Theory and Application II. SPIE Defense and Security Symposium, 2004. [2] M. F. Fingas and C. E. Brown, “Review of Oil Spill Remote Sensing,” in Eighth Int. Oil Spill Conference, SPILLCON, 2000. [3] R. Nowak, U. Mitra, and R. Willett, “Estimating inhomogeneous fields using wireless sensor networks,” IEEE Journal on Selected Areas in Communications, vol. 22, no. 6, pp/


© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicPresentation_ID 1 Cisco Self- Defending Network (SDN)

and preserve bandwidth Monitoring, Correlation, and Response Cisco® Security Agent Cisco Security Agent Internet Intranet Day-Zero Endpoint Protection Branch- Office Protection Converged Perimeter Protection Integrated Data-Center Protection Server Protection Policy-Based Solution Management Mitigating Targeted Attacks and Malware Self-Defending Network Applied High-capacity protection of servers and applications Application and protocol inspection to protect servers and systems Local server protection/


System Architectures for Wireless & Internet Application Systems Speaker: Jerry Gao Ph.D. San Jose State University URL:

user interface, voice, media, and data use What technology? - Evaluate and select technology Jerry Gao Ph.D.9/2002 Design Issues for Mobile-Based System Architectures All Rights Reserved Topic: Wireless System Architecture What is the security solution? - Network security (air security) - User access control - Secured communication, channels, sessions - Secured server and applications - Client security What are the standards? - network standards - protocol standards - technology standards Jerry Gao Ph.D/


Security Solutions for Wireless Sensor Networks 姓名 : 曹倫誠 學號 :79864015 Date:2010/06/07.

wireless transceiver,an energy unit that may be a ba- ttery or a mechanism to obtain energy from the environment. Sensor nodes are distributed over a potentially vast geographical area to form a static, multi-hop, self-organizing network. Threat Models and Their Relevance in WSNs The Dolev-Yao threat model often used to formally analyze crypto-protocols/ With the Zero Common Knowledge (ZCK) protocol2) we provide an authen- tication protocol that establishes well-defined pair-wise security associations We /


Mesh Networks Product Group Motorola, Inc. Mesh Networks MotoMesh Solo.

for Geo-Location RJ45 port with 3 IP address WMC 6300 Wireless Modem Card PCMCIA II type Client Unit Use with PC or PDA MWR 6300 Mesh Wireless Router Wireless Router Interconnection of IAP & Client Reference Point for Geo-Location WSM 6300 Wireless Sensor Modem Senor Monitoring RS-232C Serial Connection Wireless Router MEA Software  MeshManager™  Network Management & Operational Tools  Device Manager, Alarm Browser & Remote Device Manager  OS/


Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 2.

transfer reliability. Power management to ensure low - power consumption. 5 6 CSMA-CA Protocol How it works? Wireless Sensor Network Standards IEEE 802.15.4 Standard The physical layer is compatible with current wireless standards such as Bluetooth MAC layer implements synchronization, time slot management, and basic security mechanisms. 7 –“the software” –Network, Security & Application layers –Brand management IEEE 802.15.4 –“the hardware” –Physical & Media Access Control/


15-744: Computer Networking L-17 Data-Oriented Networking.

secured and delivered reliably? How are legacy systems incorporated? Application Protocol SenderReceiver Xfer Service and Data Data Naming Data (DOT) Application defined names are not portable Use/ since multi-source model allows inexact state /sensor networks Topology discovery dominates capacity Routing algorithm solves wrong problem Wireless/ retransmission (snoop) Fabricate zero-window during short-term /optimize?, efficiency? Knowledge-Performance Tradeoff Use of Knowledge Oracles Performance Contacts + /


15-744: Computer Networking L-16 Data-Oriented Networking.

since multi-source model allows inexact state /sensor networks Topology discovery dominates capacity Routing algorithm solves wrong problem Wireless/ retransmission (snoop) Fabricate zero-window during short-term /optimize?, efficiency? Knowledge-Performance Tradeoff Use of Knowledge Oracles Performance Contacts + /secured and delivered reliably? How are legacy systems incorporated? Application Protocol SenderReceiver Xfer Service and Data Data Naming Data (DOT) Application defined names are not portable Use/


Copyright © 1995-2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.

in IPv6 essentially move VPN support into the operating system and lower layers of the protocol stack. Security is host to host, or host to network, or network to network as with VPN’s –Actually, VPN’s are rarely used host to host, but if the network had a single host, then it is equivalent. 16 Copyright © 1995-2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES/


11 Intel ® Centrino ® 2 with vPro™ Technology and Intel ® Core™2 processor with vPro™ Technology Best for Business: Manageability and Security on the Chip.

playback and functionality, and wireless performance and functionality will/use model Security agent presence monitored by hardware View the use model Network security credentials available even if OS is off or down View the 802.1x, Cisco SDN* use modelView the 802.1x, Cisco SDN* use model Microsoft NAP* use model Hardware-based network filters add depth to software protection View the use model/profiles and execution protocols that describe specific/IT community Using collaboration, knowledge management tools/


Dr. Vijay Raghavan Defense Advanced Research Projects Agency Information Exploitation Office Network Embedded Systems Technology (NEST) November 12, 2003.

run while others load.  Implies dynamic linking.  Requires OS-style security 11 UNCLASSIFED – FOR OFFICIAL USE ONLY The Big Three Problems - MITRE  Sentry Service (power) The required “on” subset of the network will be too large.  Alternative drives up required sensor range.  Extending system life by raising node density is inferior to just using bigger battery Need temporal sampling. Need power savings of ~100x. Need/


Robust Range-Independent Localization for Wireless Sensor Networks Radha Poovendran Joint work with Loukas Lazos Network Security Lab University of Washington.

Robust Range-Independent Localization for Wireless Sensor Networks Radha Poovendran Joint work with Loukas Lazos Network Security Lab University of Washington http://www.ee.washington.edu/research/nsl/faculty/radha 2 Motivation Problem Assumptions Approach Solution: SeRLoc Threats and defense Performance High resolution localization: HiRLoc Conclusions Talk Outline 3 Location information is used for Applications-Search & rescue etc. Network Functions-Routing etc. Location estimation Techniques Range-based /


Motion-MIX Mobile Traffic Sensor Network vs. Motion-MIX : Tracing & Protecting Mobile Wireless Nodes # Jiejun Kong, # # Jiejun Kong, * Dapeng Wu, + Xiaoyan.

The notion has been used in modern crypto since 1970s –Based on NP-complexity –The guard wins the game with 1 - negligible probability –The adversary wins the game with negligible probability –The asymptotic notion of “ negligible ” applies to one-way function (encryption, one-way hash), pseudorandom generator, zero-knowledge proof, …… AND this time …… Our Asymptotic Network Security Model Concept: the probability of security breach decreases exponentially toward/


Design of Interference-Aware Communication Systems Presentation to Freescale Semiconductor Wireless Networking and Communications Group 16 Dec 2010 Prof.

as impulsive noise  Solution: Receiver design  Listen to environment  Build statistical modelUse model to mitigate RFI  Goal: Improve communication  10-100x reduction in bit error rate (done)  10x improvement in network throughput (on-going) Wireless Networking and Communications Group 7 Project began January 2007 RFI Modeling Wireless Networking and Communications Group 8 Sensor networks Ad hoc networks Dense Wi-Fi networks Cluster of hotspots (e.g. marketplace) In-cell and out-of/


Wireless Communications: Lecture 3 Professor Andrea Goldsmith

3 Professor Andrea Goldsmith Short Course: Wireless Communications: Lecture 3 Professor Andrea Goldsmith UCSD March 22-23 La Jolla, CA Lecture 2 Summary Capacity of Flat Fading Channels Four cases Nothing known Fading statistics known Fade value /


1 Delay Tolerant Networks Arezu Moghadam PhD Candidacy Talk 12/18/2007.

network over one device. Different paths for signaling and data. Challenges  Routing, transport protocol, naming, security over multiple paths and etc. Interplanetar y or satellite Sensors/evaluation Model objective Delivery ratio DelayMessage redundancy Knowledge Flooding HighLow (the least) High  Buffer congestion Zero Knowledge based /knowledge  Message arrival time at a node must be predicted.  Predicted arrival time is used/ 2 44 Practical routing simulation  Wireless LAN traces converted into a DTN /


Copyright © 1995-2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.

in IPv6 essentially move VPN support into the operating system and lower layers of the protocol stack. Security is host to host, or host to network, or network to network as with VPN’s –Actually, VPN’s are rarely used host to host, but if the network had a single host, then it is equivalent. 16 Copyright © 1995-2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES/


1 Resource sharing in mobile wireless networks Maria Papadopouli Computer Science Department Columbia University

access the data Peer-to-Peer –Routing in mobile, ad hoc & sensor networks 8 Mobile information access Interactivity model : Synchronous –Users directly access or request the data Asynchronous (using prefetching) –Hoarding (Coda [CMU], Seer [UCLA]) 9 Limitations of infostations & wireless WAN No communication infrastructure eg field operation missions, tunnels, subway Emergency Overloaded Expensive Wireless WAN access with low bit rates & high delays 10 Limitations of ad/


Design of Interference-Aware Communication Systems WNCG “Dallas or Bust” Roadtrip Wireless Networking and Communications Group 24 Mar 2011 Prof. Brian.

the night whenelectricityisavailable Micro- production : better knowledge of energy produced to balance the network Security featuresFireisdetecte d : relaycanbeswitched off rapidly Source: ETSI 28 Computation Communication Networks of networks Networks Data acq. Antennas Wires Communication links Processors Systems Compilers Circuit design Protocols Systems of systems Middleware Operating systems Devices Waveforms Networks of systems Applications 29 Wireless Networking & Comm. Group 17 faculty 140 grad/


Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.

cost is amortized over the lifetime of a long-lived sensor network? 8 Related Work Broadcast plaintext keys [Anderson04ICNP]  If an eavesdropper is not within range of both communicating sensors, then the key is secure  Assumes very small number of eavesdroppers  No way to improve link security if eavesdroppers are in range  We propose using the underlying wireless channel diversity to greatly improve this solution domain 9/


1 Multimodal Wireless Networking: From Message Forwarding to Infrastructure Networks Henning Schulzrinne Maria Papadopouli Computer Science Department.

access the data Peer-to-Peer –Routing in mobile, ad hoc & sensor networks 13 Mobile information access Interactivity model : Synchronous –Users directly access or request the data Asynchronous (using prefetching) –Hoarding (Coda [CMU], Seer [UCLA]) 14 Limitations of infostations & wireless WAN No communication infrastructure eg field operation missions, tunnels, subway Emergency Overloaded Expensive Wireless WAN access with low bit rates & high delays 15 Limitations of ad/


An Introduction to Network Coding Muriel Médard Associate Professor EECS Massachusetts Institute of Technology Ralf Koetter Director Institute for Communications.

An introduction to network coding: –Network model –Algebraic aspects –Delay issues Network coding for wireless multicast: –Distributed randomized coding –Erasure reliability –Use of feedback –Optimization in choice of subgraphs –Distributed optimization –Dealing with mobility –Relation to compression Network coding in non-multicast: –Algorithms –Heuristics –Network coding for delay reduction in wireless downloading Security with network coding: –Byzantine security –Wiretapping aspects Network coding s t/


Internal: How to Use This Presentation This presentation is designed to facilitate a walkthrough of Xerox ® ConnectKey ® Technology. Each slide contains.

full online support knowledge base right from /organization’s wireless network Mopria ®/Network Accounting – Keep audit trails with comprehensive audit logs and confirmation reports Secure data transmission to and from the device using industry standard protocols/Security 50 Index Security Hands off Protection McAfee Whitelisting Technology 51 Known users Approved software Normal usage Attacks Unknown users Malicious acts Polymorphic zero/ Compliance 63 * Select models only ENERGY STAR ®/tray-full sensor. The/


Prof. Maria Papadopouli

/useful/etc… Telecommunications & Networks LAB ICS-FORTH Spectrum analyzers Airmagnet survey & planner AMS airmagnet analyzers Wireless Mesh Testbed @ Heraklion Deployed by ICS-FORTH The green line indicates the management/monitoring network, the blue line indicates the operational network, while the red line shows the under-development part of the network Agenda Introduction on Mobile Computing & Wireless Networks Wireless Networks - Physical Layer IEEE 802.11 MAC Wireless Network Measurements & Modeling/


IP puzzles, probabilistic networking, and other projects at Wu-chang Feng Louis Bavoil Damien Berger Abdelmajid Bezzaz Francis Chang Jin Choi.

use of the Internet Computational tax paid directly to Intel Demand for a whole new class of network devices Puzzle proxies and firewalls based on IXP network processors Is this for real? Yes Protocol design Puzzle design Prototype implementation Evaluation Basic protocol/Demo Little Sister Sensor Networking Application Visit OGI for a full demo! Back Approximate packet classification caching Results Order of magnitude space savings for an error rate of one in a billion Analytical model for controlling /


Los Angeles Palo Alto © 2004 Accelerating.org Challenges for World Security Policy John Smart USAWC, August 2004, Carlisle, PA Adapting to the Future:

Economics would predict zero annual growth) /Europe Steel crossbow first used in war1370, Europe/not their sensors and effectors)/ Properties: Information Intelligence (World Models) Information Interdepence (Ethics) Information/protocol/ platform of choice is the Net Offerings are moving from products to services. "Utilitization" of processing, applications, storage, knowledge/multimedia, internet, wireless It is even/) Example: Donkey cart generators Security (networked cameras; camera traps) Culturally-/


15-744: Computer Networking L-20 Data-Oriented Networking.

secured and delivered reliably? How are legacy systems incorporated? 8 Application Protocol SenderReceiver Xfer Service and Data Data Naming Data (DOT) Application defined names are not portable Use/filters). CCN node model get /parc.com/sensor networks Topology discovery dominates capacity Routing algorithm solves wrong problem Wireless/ retransmission (snoop) Fabricate zero-window during short-term /optimize?, efficiency? 54 Knowledge-Performance Tradeoff 55 Use of Knowledge Oracles Performance Contacts /


15-744: Computer Networking L-20 Data-Oriented Networking.

secured and delivered reliably? How are legacy systems incorporated? 8 Application Protocol SenderReceiver Xfer Service and Data Data Naming Data (DOT) Application defined names are not portable Use/sensor networks Topology discovery dominates capacity Routing algorithm solves wrong problem Wireless/ Local retransmission (snoop) Fabricate zero-window during short-term disruption Manipulate/to optimize?, efficiency? 40 Knowledge-Performance Tradeoff 41 Use of Knowledge Oracles Performance Contacts + Queuing/


Securing Location Privacy in Vehicular Applications and Communications DISSERTATION DEFENSE GEORGE CORSER NOVEMBER 6, 2015 1.

Intrusion Detection In Wireless Sensor Networks. International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 2. IJETAE. Alnahash, N., Corser, G., Fu, H. (2014, April). Protecting Vehicle Privacy using Dummy Events. In 2014 American Society For Engineering Education North Central Section Conference. ASEE NCS 2014. Oluoch, J., Corser, G., Fu, H., Zhu, Y. (2014, April). Simulation Evaluation of Existing Trust Models in Vehicular/


Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.

Security and privacy issues  Software Defined Networks  Interference mitigation in Femtocells  Crowdsourcing in Heterogeneous Networked Environments Introduction 2-33 Some more sample project topics CPE 400  Simulation  Transmission power/sleep control in sensor networks for extended lifetime  Data aggregation at routers/sensors for bandwidth conservation  Performance of existing routing protocols under error prone networks/-zeros subnet cannot be used Subtract one “if” all-ones subnet cannot be used /


Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.

Security and privacy issues  Software Defined Networks  Interference mitigation in Femtocells  Crowdsourcing in Heterogeneous Networked Environments Introduction 2-33 Some more sample project topics CPE 400  Simulation  Transmission power/sleep control in sensor networks for extended lifetime  Data aggregation at routers/sensors for bandwidth conservation  Performance of existing routing protocols under error prone networks/-zeros subnet cannot be used Subtract one “if” all-ones subnet cannot be used /


University of Virginia Timeliness and Security in Real-Time Data Services Sang Hyuk Son Department of Computer Science University of Virginia Charlottesville,

–in practice, only when they are used by transactions University of Virginia An Example Data/sensor networks University of Virginia Recent Papers V. Lee, K. Lam, S. H. Son, and E. Chan, "On the Transaction Processing with Partial Validation and Timestamps Ordering in Mobile Broadcast Environments," IEEE Transactions on Computers, vol. 51, no. 10, Oct. 2002. C. Park, S. Park, and S. H. Son, "Multi-version Locking Protocol with Freezing for Secure Real-Time Database Systems," IEEE Transactions on Knowledge/


Doc.: IEEE 802.15-10-0412-06-wng0 Submission June 2010 Robert Moskowitz (ICSAlabs/VzB)Slide 1 Project: IEEE P802.15 Working Group for Wireless Personal.

CAN be achieved with – AES-CBC (and CMAC) AES-CCM used by ESP or MACsec –Static ECDH Proves private key ownership Following is DEX protocol – The network is the attacker model used Assume both malicious Responder and Initiator doc.: IEEE 802.15-10-0412/zero knowledge alternative As in IEEE 802.11s SAE doc.: IEEE 802.15-10-0412-06-wng0 Submission June 2010 Robert Moskowitz (ICSAlabs/VzB)Slide 34 The Importance of Randomness HIP DEX is HIGHLY dependent on good Random numbers – No Hash function typically used/


Emerging Wireless Networks Anand Balachandran

(hardware vendors win) Backbone network resources get used (ISP’s win) Building attracts more people (store owners win) Software sold (software vendors win) 05/18/01Multimedia Systems Unsolved Issues Quality of Service Resource reservation and efficient bandwidth allocation Providing differentiated services with guarantees Power Conservation and control Energy-efficient channel access protocols Anonymity Keep user identity hidden (zero knowledge algorithms) Secure location tracking 05/18/01Multimedia/


SMART CITIES Application of wireless Technologies Presented by: Harveer Singh |Student Number 7475537 | Instructor : Prof Ivan Stojmenovic 1.

Security/use of Traditional Wireless sensor network (WSN), WSN radio frequency identification (RFID) and controlling element  Wireless technologies in the form of label recognize device, RFID tags, and sensors/Network (WAN): It is divided into number of clusters, where each clusters represent each Base Station (BS). It works on protocol defined by 802.22 (Wide Regional Area Network (WRAN)) System Model/ = α- β reaches zero or not.  PR/ and knowledge in cities, Committee of Digital and Knowledge based /


Presentation Title Security and Privacy in ISO/IEC JTC 1 PresenterLaura Lindsay SessionSession 8.2: Strategic Topic #3: Security & Privacy Document Name/Version.

the concepts associated with, and provides management guidance on, network security. ISO/IEC 27033-6 Network security – Part 6: Securing wireless IP network access DIS Describes the threats, security requirements, security control and design techniques associated with wireless networks. It provides guidelines for the selection, implementation and monitoring of the technical controls necessary to provide secure communications using wireless network.59 WG 4 Projects StandardTitleStatusAbstract ISO/IEC 27034-2/


Fighting Byzantine Adversaries in Networks: Network Error-Correcting Codes Michelle Effros Michael Langberg Tracey Ho Sachin Katti Muriel Médard Dina Katabi.

design EVERBETTEREVERBETTER... C=2 [This work] All the above, plus security Tons of work [SET03] Gap provably exists Multicast Wired Wireless Simplifying assumptions All links unit capacity (1 packet/transmission) Acyclic network Network = Hypergraph ALL of Alice’s information decodable EXACTLY by EACH Bob Network Model [GDPHE04],[LME04] – No intereference Multicast Networks Webcasting P2P networks Sensor networks Multicast Network Model ALL of Alice’s information decodable EXACTLY by EACH Bob 3 2/


Intrusion Detection/Prevention Systems. Objectives and Deliverable Understand the concept of IDS/IPS and the two major categorizations: by features/models,

algorithmic perspective: Features - capture intrusion evidences Models - piece evidences together –From a system architecture perspective: Various components: audit data processor, knowledge base, decision engine, alarm generation and responses/Zero-Day Attacks Honeynet/darknet, Statistical detection Security Information Fusion Internet Storm Center (aka, DShield) has the largest IDS log repository Sensors covering over 500,000 IP addresses in over 50 countries More w/ DShield slides Requirements of Network/


Presented by: Harshal Pandya

-based optimal scheme that minimizes delay while using the lowest possible number of transmissions Abstract INTRODUCTION Related Work Spray & Wait Optimization Simulation Conclusion Related Work A large number of routing protocols for wireless ad-hoc networks have been proposed in the past. The performance of such protocols would be poor even if the network was only slightly disconnected When the network is not dense enough (as in/


Intrusion Detection/Prevention Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality,

perspective: Features - capture intrusion evidences Models - piece evidences together –From a system architecture perspective: Various components: audit data processor, knowledge base, decision engine, alarm generation and/Zero-Day Attacks Honeynet/darknet, Statistical detection Security Information Fusion Internet Storm Center (aka, DShield) has the largest IDS log repository Sensors covering over 500,000 IP addresses in over 50 countries More w/ DShield slides Backup Slides Requirements of Network/


C++ Network Programming Mastering Complexity with ACE & Patterns Dr. Douglas C. Schmidt

networking protocols Component Middleware Layers 6 Operating System & Protocols Operating systems & protocols/management Examples CORBA Component Model & Object Services,/ knowledge of/ Real-time mission-critical sensor-to-shooter needs Highly dynamic/ 24 Use of non-portable return value Unused structure members not zeroed out Protocol and /security by allowing each process to verify or control per-user or per- session security & authentication information We now cover the following ACE classes that can use/


C++ Network Programming Mastering Complexity with ACE & Patterns Dr. Douglas C. Schmidt

networking protocols Component Middleware Layers 6 Operating System & Protocols Operating systems & protocols/management Examples CORBA Component Model & Object Services,/ knowledge of/ Real-time mission-critical sensor-to-shooter needs Highly dynamic/ 24 Use of non-portable return value Unused structure members not zeroed out Protocol and /security by allowing each process to verify or control per-user or per- session security & authentication information We now cover the following ACE classes that can use/


C++ Network Programming Mastering Complexity with ACE & Patterns Dr. Douglas C. Schmidt

of networking protocols Component Middleware Layers 6 Operating System & Protocols Operating systems & protocols provide /knowledge of design strategies, constraints & “best practices” 12 Overview of Pattern Languages Motivation Individual patterns & pattern catalogs are insufficient Software modeling/-critical targets Real-time mission-critical sensor-to-shooter needs Highly dynamic QoS /return -1; 24 Use of non-portable return value Unused structure members not zeroed out Protocol & address family mismatch/


Digital Forensics Dr. Bhavani Thuraisingham

new exploitation techniques. Such analysis could be used to further tighten security of the actual network being protected by the honeypot Some tools: Firewall, Antivirus software and Internet Security Software. For authentication, use strong passwords and change it on a bi-weekly/monthly basis. When using a wireless connection, use a robust password. Network analyzer to monitor and analyze the network. Network Forensics What is Network Forensics? http://searchsecurity.techtarget.com/sDefinition/


1 Aman Shaikh, Albert Greenberg, August 2005 Operations and Management of IP Networks: What Researchers Should Know Aman Shaikh Albert Greenberg AT&T.

/Data-Mining techniques to flag/correct input errors Exploit big opportunities for automation –Auto-populate forms –Use AI/Data-Mining techniques to flag/correct input errors 55 Aman Shaikh, Albert Greenberg, August 2005 Network Care Fundamentals Troubleshooting Maintenance Network Security 56 Aman Shaikh, Albert Greenberg, August 2005 Elements of Network Care Troubleshooting Detect Localize Diagnose Fix Maintenance and upgrades Plan Notify customers Perform Verify Prepare/


R. Krishnan Approved for public release, distribution unlimited. Disruption Tolerant Networking SPINDLE Project: Phase 1 Accomplishments Rajesh Krishnan.

used for other projects with minor additional effort Limitations –needs a powerful machine with a lot of memory –needs host kernel modification –emulator is a single process, which limits total event throughput –inherits ns-2 limitations for modeling wireless networks/Zero knowledge strategy consumes a lot of resources Hybrid performs worse than zero knowledge/of DTN protocols without compiling C/C++ code Easier to tie-in policy, mission specifics, and logistics with networking Intelligent network management /


Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network and Application Forensics October 8, 2010.

Security Software. For authentication, use strong passwords and change it on a bi-weekly/monthly basis. When using a wireless connection, use a robust password. Network analyzer to monitor and analyze the network.Antivirus softwareauthenticationNetwork analyzer Network Forensics l What is Network/ to reduce redundancy in intrusion alerts - Graph model for presenting and interacting with th3 evidence - /l Evidence preprocessing module l Attack knowledge base l Assets knowledge base l Evidence graph generation /


Alan Paller The SANS Institute

2, the flight- planning software used by the Army and Air Force/with other agencies Found two zero-days Helped Microsoft and / be willing to combine their knowledge of attacks and offense to /protocols and services AC‐4, CM‐6, CM‐7, SC‐7 Not yet graded 14 Wireless/model) We build a cadre of skilled security architects We buy products/systems with security baked in We increase the rewards for security people with key technical skills (licensing) We train system administrators to become the human sensor network/


Ads by Google