Advanced Network Security Fall 2014 Instructor: Kun Sun, Ph.D.

Slides:



Advertisements
Similar presentations
LECTURE 1: COURSE INTRODUCTION Xiaowei Yang. Roadmap Why should you take the course? Who should take this course? Course organization Course work Grading.
Advertisements

FINAL YEAR PROJECT 2013/2014 UNIVERSITI MALAYSIA PERLIS
Introduction 1-1 CS6204 Recent Advances in Computer Security and Privacy 3-credit graduate-level seminar Danfeng (Daphne) Yao Spring 2010 Office hours:
Advanced Data Communications (Network Security) TaeKyoung Kwon
The Aggie Code of Honor and the Aggie Honor System Office
Writing Skills Improvement Guide Dr. Zubair A. Baig Computer Engineering Department KFUPM, Dhahran.
Advanced Topics in Next- Generation Wireless Networks Qian Zhang Department of Computer Science HKUST.
UMass Lowell Computer Science Advanced Algorithms Computational Geometry Prof. Karen Daniels Spring, 2004 Project.
Advanced Computer Networks Fall 2010 Instructor: Haining Wang.
MIS 470: Information Systems Project Yong Choi School of Business Administration CSU, Bakersfield.
Advanced Computer Networks cs538, Fall 2014 Klara Nahrstedt.
Business Marketing Overview of Course Dr. Dawne Martin Calvin 201 B – 107 next week Office telephone: Office.
Soc 3307f Research Report. Overview Typed, double-spaced, 12 point font Length: pages Finished report should have a  Title page  Table of Contents.
Understanding data communications Taekyoung Kwon
1 How to Search, Read, Write, and Present a Paper.
C HU H AI C OLLEGE O F H IGHER E DUCATION D EPARTMENT O F C OMPUTER S CIENCE Preparation of Final Year Project Report Bachelor of Science in Computer Science.
CS507 Fundamentals of Research Fall About the Course - Topics Graduate School How to read a research paper Planning and conducting research Writing.
Proposal for Term Project Operating Systems, Fall 2011 J. H. Wang Nov. 3, 2011.
Proposal for Term Project Operating Systems, Fall 2015 J. H. Wang Sep. 18, 2015.
Proposal for Term Project Operating Systems, Fall 2008 J. H. Wang Nov. 5, 2008.
Term Project Description CAP6135 Spring Term Project Two students form a group to do term project together – A research oriented term project.
CS 498 Senior Seminar Students will research a current topic in computer science, write a paper on that topic, and make an oral presentation.
Academic Integrity at IU Code of Student Rights, Responsibilities and Conduct.
How to start research V. Jayalakshmi. Why do we research? – To solve a problem – To satisfy an itch – To gain more market share/ Develop and improve –
CSE 534: Advanced Computer Networks
Advanced Systems and Network Security Fall 2015 Instructor: Kun Sun, Ph.D.
Technical paper writing for journal and conference submission III Zhen Jiang Department of Computer Science Information Security Center West Chester University.
1 How to Give a Good Presentation? Cliff C. Zou CAP /07/08.
Jan 10, 2001CSCI {4,6}900: Ubiquitous Computing1 Administrative Chores Add yourself to the mailing
Proposal for Term Project Operating Systems, Fall 2012 J. H. Wang Nov. 13, 2012.
Term Project Description CAP6135 Spring Term Project Two students form a group to do term project together – A research oriented term project.
Proposal for Term Project Information Security, Fall 2014 J. H. Wang Sep. 25, 2014.
1 How to Give a Good Presentation? Cliff C. Zou CAP /2010.
Advanced Computer and Network Security Fall 2014 Instructor: Haining Wang.
Special topics in computer applications Taekyoung Kwon
Course Information Andy Wang COP 5611 Advanced Operating Systems.
C HU H AI C OLLEGE O F H IGHER E DUCATION D EPARTMENT O F C OMPUTER S CIENCE Preparation of Final Year Project Report Bachelor of Science in Computer Science.
Term Project Description CAP6135 Spring Term Project Two students form a group to do term project together – A research oriented term project.
CPE433: Performance Evaluation and Modeling Introduction Dr. Gheith Abandah د. غيث علي عبندة.
Research Methods Technical Writing Thesis Conference/Journal Papers
Cluster and Grid Computing Course Project. Project Proposal Submit a one-page proposal to me by Tuesday, October 12 Two-person teams are encouraged No.
Course Information Andy Wang COP 5611 Advanced Operating Systems.
Introduction to Research High-Intermediate English Language Program.
The Aggie Code of Honor and the Aggie Honor System Office Timothy C. Powers Director, Aggie Honor System Office
Lab Report. Title Page Should be a concise statement of the main topic and should identify the actual variables under investigation and the relationship.
Course Information Andy Wang COP 5611 Advanced Operating Systems.
Proposal for Term Project Compilers, Fall 2015 J. H. Wang Nov. 2, 2015.
CS & CS ST: Probabilistic Data Management Fall 2016 Xiang Lian Kent State University Kent, OH
Pilot Course-Based Undergraduate Research Experience for 1st-Year Student Success curriculum Regina Williams Davis Asst. Provost for Student Success &
Proposal for Term Project Information Security, Fall 2016
L – Modeling and Simulating Social Systems with MATLAB
Andy Wang COP 5611 Advanced Operating Systems
Case Study ECON 140 ECON 141 FIN 221
Epidemic spreading in complex networks with degree correlations
L – Modeling and Simulating Social Systems with MATLAB
Mary Lou Soffa Professor and Chair
Introduction to Operating Systems
ECE 3000: Engineering Seminar
Proposal for Term Project Operating Systems, Fall 2018
Research and Life in Sakurai Lab.
How to Read a Paper (Practice: CCS’14)
Andy Wang COP 5611 Advanced Operating Systems
MSc in Statistical Science Graduate Open Day – 31 October 2018
A Template for Producing IT Research and Publication
Presentation and project
Andy Wang COP 5611 Advanced Operating Systems
CSCI284 Spring 2004 GWU Introduction CSCI284 Spring 2004 GWU
Presentation and project
Term Project Description
Presentation transcript:

Advanced Network Security Fall 2014 Instructor: Kun Sun, Ph.D.

2 Why CSCI 780?  For credits  Ph.D. requirement  Information security is important  System security  Network security

3 Our Goal  Latest security research activities  Reading technical papers in recent years  How to do research in security area  How to read research paper?  How to write research paper?  How to write a paper review?  How to present your research work?

4 What is CSCI 780?  This is a graduate level course  Reading papers  Two class presentations  Teach us  Two paper review reports  Insightful comments  Other than the presented papers, 2-3 pages  One term project  By yourself  5 extra point if presented in the class, FCFS Grading Policy  10% class attendance  20% Paper reviews  30% Class presentation  40% Term project

5 Paper Reviews  Summarize the main idea of the paper  Problem they solved  Approach they took: novelty  How did they evaluate  Pros and Cons  Any ways to improve the work?

6 Term Project  Proposal (Due on Oct. 1)  Problem statement  Progress report (Optional)  Preliminary results  Final report (Due on Dec. 3)  Complete project report

Project Proposal  PDF, 2-3 pages, single space, 10 font size  Potential format:  Problem Statement  Motivation  Objectives  Related works  Technical approach

Final Project Report  pages, single space, 10 font size  Conform to formats of research papers  May contain the following sections:  Abstract  Introduction  Related work  System Architecture/System design/Technical Approach  Implementation and experimental results  Discussion (e.g., limitations)  Conclusion and future works

9 Paper Reviews  Summarize the main idea of the paper  Problem they solved  Approach they took: novelty  How did they evaluate  Pros and Cons  Any ways to improve the work?

10 Required Skills  System programming  Network simulation  Kernel hacking  Data collection and processing  Analytical skills  Probability and statistics  Queueing theory  Mathematical modeling

11 Useful resources  Security conferences  First tier: ACM CCS, IEEE S&P, Usenix Security, NDSS; Crypto, Eurocrypt  Second tier: DSN, ESORICS, RAID, ACSAC, IMC, etc.  Third tier: SecureComm, CODASPY, DIMVA, ACNS, WiSec, etc.  System conferences  SOSP, OSDI, Usenix ATC, NSDI, ASPLOS, etc.  Journals  ACM Transactions on Information and System Security (TISSEC)  IEEE Transactions on Dependable and Secure Computing (TDSC)

12 Honor Code Violations  A. Lying: the presentation of false information with the intent to deceive.  B. Stealing: knowingly taking or appropriating the property of another, including property of the College, without the rightful owner’s permission and with the intent to permanently or substantially deprive the owner of the property.  Cheating: including, but not limited to, Plagiarism, Unauthorized Assistance/Collaboration, Use of Unauthorized materials, Unauthorized Dual Submission of Previous Academic Work, Time Constraint Violation, Directions Violation,