Research Interest overview and future directions Mina Guirguis Computer Science Department Texas State University – San Marcos CS5300 9/16/2011.

Slides:



Advertisements
Similar presentations
Being Proactive and Less Reactive in Security Operations and Cyber Attack Response Christina Raftery, MCSE, CISSP FBI Los Angeles Field Office.
Advertisements

1 Denial of Service in Sensor Networks Authors: Anthony D. Wood, John A. Stankovic Presented by: Aiyaz Amin Paniwala.
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
Driver Behavior Models NSF DriveSense Workshop Norfolk, VA Oct Mario Gerla UCLA, Computer Science Dept.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
NDN in Local Area Networks Junxiao Shi The University of Arizona
2 Language of Computer Crime Investigation
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Secure Real Time Embedded Systems Sherif Khattab and Daniel Mossé University of Pittsburgh Computer Science Department.
Introduction to Cyber Physical Systems Yuping Dong Sep. 21, 2009.
Intelligent Patrolling Sarit Kraus Department of Computer Science Bar-Ilan University Collaborators: Noa Agmon, Gal Kaminka, Efrat Sless 1.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Summary and Further Reading Part I of 13th.
Università degli Studi dell’Aquila Academic Year 2009/2010 Course: Algorithms for Distributed Systems Instructor: Prof. Guido Proietti Time: Monday:
Networks and Distributed Systems: Project Ideas
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Carnegie Mellon University © Robert T. Monroe Management Information Systems Mobile Computing II Mobile Devices Management Information.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
IBM Digital Communities Solutions Wireless Clouds Connecting Our Communities Riz Khaliq Business Area Leader Community Broadband, IBM Global Government.
The Nordic Design House For intelligent products Rune Domsten – Vice President Technology.
Machine Learning and Optimization For Traffic and Emergency Resource Management. Milos Hauskrecht Department of Computer Science University of Pittsburgh.
Securing Information Systems
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.
Chapter 1 Intro to Routing & Switching.  Networks have changed how we communicate  Everyone can connect & share  How have networks changed the way…
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Dr Richard Overill Department of Informatics King’s College London Cyber Sleuthing or the Art of the Digital Detective.
Robot Autonomous Perception Model For Internet-Based Intelligent Robotic System By Sriram Sunnam.
[1] B. Hull, K. Jamieson and H. Balakrishnan, “Mitigating Congestion in Wireless Sensor Networks,” Proceedings of the 2nd International Conference on Embedded.
NSF Critical Infrastructures Workshop Nov , 2006 Kannan Ramchandran University of California at Berkeley Current research interests related to workshop.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Sungkyunkwan University (SKKU) Security Lab. A Framework for Security Services based on Software-Defined Networking Jaehoon (Paul) Jeong 1, Jihyeok Seo.
Distributed Computation in MANets Robot swarm developed by James Rice University.
Models of Models: Digital Forensics and Domain-Specific Languages Daniel A. Ray and Phillip G. Bradford The University of Alabama Tuscaloosa, AL
Computer Forensics Principles and Practices
Computer Science and Engineering 1 Information Assurance Research Department of Computer Science and Engineering University of South Carolina, Columbia.
International Internship Summer 2008: NICTA (Sydney, AU) Caitlin Cottrill.
College of Engineering Robert Akl, D.Sc. Department of Computer Science and Engineering.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Distributed State-Estimation Using Quantized Measurement Data from Wireless Sensor Networks Li Chai with Bocheng Hu Professor College of.
FOREWORD By: Howard Shrobe MIT CS & AI Laboratory
Crime Scene Investigator Occupation PowerPoint Created by The University of North Texas in partnership with the Texas Education Agency.
Completing network setup. INTRODUCTION Course Overview Course Objectives.
1 Security for distributed wireless sensor nodes Ingrid Verbauwhede Department of Electrical Engineering University of California Los Angeles
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
The Problem of Location Determination and Tracking in Networked Systems Weikuan Yu, Hui Cao, and Vineet Mittal The Ohio State University.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Cooperative Robotics and Sensor Networks Isaac Rieksts My web site
Adversary Models in Wireless Networks: Research Challenges Radha Poovendran Network Security Lab (NSL) University of Washington.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
COMBINING TECHNOLOGIES. WHY COMBINED? Achieve a lot more by using them together Achieve a lot more by using them together.
U.S. DOT Next Generation Project: A National Framework and Deployment Plan Summit for Large Cities Chicago, IL – May 21, 2009.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
IT Panel - ISO General Assembly, Oslo 2010© 2010 IBM Corporation1 Building a Smarter Planet IT Panel – ISO General Assembly, Oslo 2010 Adam Jollans,
AUTONOMIC COMPUTING B.Akhila Priya 06211A0504. Present-day IT environments are complex, heterogeneous in terms of software and hardware from multiple.
Models of Models: Digital Forensics and Domain-Specific Languages
Chapter 1: Explore the Network
Instructor Materials Chapter 1: Explore the Network
PhD Oral Exam Presentation
Chapter 1: Explore the Network
Cybersecurity EXERCISE (CE) ATD Scenario intro
Securing Information Systems
به نام خدا Big Data and a New Look at Communication Networks Babak Khalaj Sharif University of Technology Department of Electrical Engineering.
Cyber Physical Systems
Integrating Deep Learning with Cyber Forensics
Presentation transcript:

Research Interest overview and future directions Mina Guirguis Computer Science Department Texas State University – San Marcos CS5300 9/16/2011

Research areas Mobile Cyber-Physical Systems Security in networks and systems Digital Forensics Networks

Mobile Cyber-Physical System Cyber-Physical System (CPS) Combine computation and communication with our physical world Intelligent buildings Robotics surgery Control systems Mobile CPSs Subclass of CPSs where physical systems are mobile Cell phones, robots, cars, etc…

Motivating example First feature video from the iRobot In military applications In military applications

Other motivating examples

Research vision and goal Vision: environment in which mobile nodes collaborate to solve problems Robots communicate to achieve a specific task Cell phones share resources (CPU, network, power) Cars coordinate to realize an intelligent transportation system Goal: ensure that Mobile CPS applications are safe and secure

Challenges Mobile CPSs will rely on wireless communication Attackers can interfere with/jam the signal between mobile nodes, preventing them from communicating Mobile CPSs are emerging as complex systems Complex systems are easier to attack and harder to debug Mobile CPSs will make decisions under failures Control theory address noise due to random failure Attacks are not random failures, but well orchestrated

General research approach Play the role: offense Identifying optimal and suboptimal attack policies What is the worst adversarial signal that would cripple the system at this point in time? How can an attacker evade detection? Play the role: defense Randomization: make the system less predictable Attacker would not be able to mount potent attacks

Mobile CPS Lab 4 iRobot Create, each with a netbook on top Camera, wireless, sensors 2 SRV-1 Blackfin robots Open source Camera, wireless, sensors Servers and laptops for simulation and numerical analysis

Research areas Mobile Cyber-Physical Systems Security in networks and systems Digital Forensics Networks

Network and systems security Second feature video from a movie “Untraceable” the movie 2008Untraceable

Research agenda Goal: ensure secure and resilient networking and system components Denial of Service (DoS) attacks Uninteresting -- easy to trace back to the heavy hitters More interesting: Identify stealthy attacks Do not take a lot of resources to mount Undetectable Untraceable

Stealthy attacks Idea: to exploit “adaptation mechanisms” found in networks and computing systems Adapting content based on load Adapting traffic rates based on congestion Balancing traffic across servers Reorganizing a P2P network Analogy: Make other drivers brake when they should accelerate and accelerate when they should brake

Illustrative example… DoS attacks (exploiting capacity) Low-rate attacks (exploiting adaptation)

Exploiting adaptation Adaptation mechanisms are designed under the assumption of non-adversarial loads Examples: random traffic patterns, random arrival processes, etc.) What types (patterns) of load would make adaptation harmful? What are the tradeoffs between efficiency and tolerance to dynamic exploits?

Research areas Mobile Cyber-Physical Systems Security in networks and systems Digital Forensics Networks

Digital forensics Vision: Build effective tools to recover, examine and preserve digital evidence Examples of digital evidence: Financial fraud documents Threatening/blackmail s Contraband material Viruses, worms, trojans, backdoors, spyware, etc… Incriminating network connections Steganography channels for espionage

Digital forensics Goal: Help investigators extract evidence from a computer or a digital device (iPad, iPhone, mp3 player) Done very carefully to be admissible in court Offline versus Online (live response) Speed up the process of finding evidence Requires knowledge that spans different areas: Networks, systems, security, statistics, image processing, criminal law, etc…

Research areas Mobile Cyber-Physical Systems Security in networks and systems Digital Forensics Networks

Final remarks My address: Office hours: Mondays: 4:30 – 6:00 (in Round Rock) Tuesdays: 3:30 - 5:00 (in San Marcos) Thursdays: 10:00 – 12:00 (in San Marcos)