Data and Applications Security Research at the University of Texas at Dallas Dr. Bhavani Thuraisingham The University of Texas at Dallas April 25, 2006.

Slides:



Advertisements
Similar presentations
ELPUB 2006 June Bansko Bulgaria1 Automated Building of OAI Compliant Repository from Legacy Collection Kurt Maly Department of Computer.
Advertisements

Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #21 Privacy March 29, 2005.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Review for Final Exam November 19, 2010.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Research Directions in Identity Management Dr. Bhavani Thuraisingham The University of Texas at Dallas Collaborators and co-authors of the presentation:
1 Confidentiality and Trust Management in a Coalition Environment Lecture #11 Dr. Bhavani Thuraisingham February 13, 2008 Data and Applications Security.
Data and Applications Security (DAS) Research at UTD Dr. Bhavani Thuraisingham 20 June 2006.
Gopal Gupta Industrial Advisory Board Meeting: 9/30/11.
Introduction to Data, Information and Knowledge Management Dr. Bhavani Thuraisingham The University of Texas at Dallas Data, Information and Knowledge.
Data Management Information Management Knowledge Management Data and Applications Security Challenges Bhavani Thuraisingham October 2006.
Data and Applications Security Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security August.
Economic Development for the DFW Metroplex Related to Security: An Academic Perspective Dr. Bhavani Thuraisingham The University of Texas at Dallas December.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Dr. Bhavani Thuraisingham August 2006 Building Trustworthy Semantic Webs Unit #1: Introduction to The Semantic Web.
University of Texas at Dallas Cyber Security Research at the University of Texas at Dallas Dr. Bhavani Thuraisingham The University of Texas at Dallas.
MTBC Cloud Computing Initiative  Applications of cloud computing  Overview of the NSF Net-Centric Software and Systems (NCSS) I/UCRC  MTBC and NCSS.
1 Data Mining for Surveillance Applications Suspicious Event Detection Dr. Bhavani Thuraisingham April 2006.
Dr. Bhavani Thuraisingham The University of Texas at Dallas Trustworthy Semantic Webs March 25, 2011 Data and Applications Security Developments and Directions.
Sample of Data Security and Knowledge Discovery Research at the University of Texas at Dallas Dr. Bhavani Thuraisingham Dr. Latifur Khan Dr. Murat Kantarcioglu.
Cyber Security Research at the University of Texas at Dallas Sample Projects Prof. Bhavani Thuraisingham, PhD, CISSP Prof. Latifur Khan, PhD Prof. Murat.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Data and Applications Security (DAS) Research at UTD Dr. Bhavani Thuraisingham The University of Texas at Dallas 19 June 2006.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Secure Multimedia Data.
Social Networks and Surveillance: Evaluating Suspicion by Association Ryan P. Layfield Dr. Bhavani Thuraisingham Dr. Latifur Khan Dr. Murat Kantarcioglu.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Inference Problem - I September.
Dr. Bhavani Thuraisingham January 14, 2011 Building Trustworthy Semantic Webs Lecture #1: Introduction to Trustworthy Semantic Web.
CSCE 824 Secure (and Distributed) Database Management Systems FarkasCSCE
1 Data Mining for Surveillance Applications Suspicious Event Detection Dr. Bhavani Thuraisingham April 2006.
Geospatial Semantic Web Interim (2.5 months) Progress Review for Phase 1 Dr. Bhavani Thuraisingham (Computer Science) Dr. Latifur Khan (Computer Science)
Data Mining for Surveillance Applications Suspicious Event Detection Dr. Bhavani Thuraisingham.
Secure Geospatial and Sensor Semantic Webs for Crime Analysis and Border Security Prof. Bhavani Thuraisingham, PhD Prof. Latifur Khan, PhD Mr. Alam Ashraful.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Data Mining, Security and Privacy Dr. Bhavani Thuraisingham The University of Texas at Dallas March 2008.
Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Trustworthy Semantic Webs Building Geospatial Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas October 2006 Presented at OGC Meeting,
Data Mining for Surveillance Applications Suspicious Event Detection
Data and Applications Security
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Lecture #11: Ontology Engineering Dr. Bhavani Thuraisingham
Data and Applications Security
Active Learning Intrusion Detection using k-Means Clustering Selection
Introduction to Data, Information and Knowledge Management
Data Mining for Surveillance Applications Suspicious Event Detection
Analyzing and Securing Social Networks
Research Directions in Identity Management
Building Trustworthy Semantic Web
Prof. Bhavani Thuraisingham The University of Texas at Dallas
Data and Applications Security Developments and Directions
Data Mining for Surveillance Applications Suspicious Event Detection
Data and Applications Security Developments and Directions
Trustworthy Semantic Webs
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Building Trustworthy Semantic Web
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security
Data and Applications Security Developments and Directions
Data and Applications Security
Presentation transcript:

Data and Applications Security Research at the University of Texas at Dallas Dr. Bhavani Thuraisingham The University of Texas at Dallas April 25, 2006

Cyber Security Research Areas at UTD  Network Security Secure wireless and sensor networks  Systems and Language Security Embedded systems security, Buffer overflow defense  Data and Applications Security Information sharing, Geospatial data management, Surveillance, Secure web services, Privacy, Dependable information management, Intrusion detection  Security Theory and Protocols Secure group communication  Security Engineering Secure component-based software  Cross Cutting Themes Vulnerability analysis, Access control

Research Group: Data and Applications Security l Core Group - Prof. Bhavai Thuraisingham (Professor & Director, Cyber Security Research Center) - Prof. Latifur Khan (Director, Data Mining Laboratory) - Prof. Murat Kantarcioglu (Joined Fall 2005, PhD. Purdue U.) - Prof. Kevin Hamlen (will join Fall 2006 from Cornell U.) l Students and Funding - 10 PhD Students, 16 MS students - Research grants (Since 2005) Air Force Office of Scientific Research Center, Raytheon Corporation, Nokia Corporation and proposals submitted to NSF, DHS, etc. - Our Vision: l Assured Information Sharing, Secure Geospatial data management, Video Surveillance

Vision 1: Assured Information Sharing Publish Data/Policy Component Data/Policy for Agency A Data/Policy for Coalition Publish Data/Policy Component Data/Policy for Agency C Component Data/Policy for Agency B Publish Data/Policy 1.Friendly partners 2.Semi-honest partners 3.Untrustworthy partners

Vision 2: Secure Geospatial Data Management Data Source A Data Source B Data Source C SECURITY/ QUALITY Semantic Metadata Extraction Decision Centric Fusion Geospatial data interoperability through web services Geospatial data mining Geospatial semantic web Tools for Analysts Discussions on collaborative research between UTD, OGC (Open Geospatial Consortium), Oracle and Raytheon

Vision 3: Surveillance and Privacy Raw video surveillance data Face Detection and Face Derecognizing system Suspicious Event Detection System Manual Inspection of video data Comprehensive security report listing suspicious events and people detected Suspicious people found Suspicious events found Report of security personnel Faces of trusted people derecognized to preserve privacy

Example Projects l Assured Information Sharing - Secure Semantic Web Technologies - Social Networks - Privacy Preserving Data Mining l Geospatial Data Management - Geospatial data mining - Geospatial data security l Surveillance - Suspicious Event Detention - Privacy preserving Surveillance - Automatic Face Detection l Cross Cutting Themes - Data Mining for Security Applications (e.g., Intrusion detection, Mining Arabic Documents); Dependable Information Management

Secure Semantic Web Policies Ontologies Rules Semantic Web Engine XML, RDF Documents Web Pages, Databases Inference Engine/ Rules Processor Interface to the Semantic Web Technology At UTD

Social Networks l Individuals engaged in suspicious or undesirable behavior rarely act alone l We can infer than those associated with a person positively identified as suspicious have a high probability of being either: - Accomplices (participants in suspicious activity) - Witnesses (observers of suspicious activity) l Making these assumptions, we create a context of association between users of a communication network

Privacy Preserving Data Mining l Prevent useful results from mining - Introduce “cover stories” to give “false” results - Only make a sample of data available so that an adversary is unable to come up with useful rules and predictive functions l Randomization and Perturbation - Introduce random values into the data and/or results - Challenge is to introduce random values without significantly affecting the data mining results - Give range of values for results instead of exact values l Secure Multi-party Computation - Each party knows its own inputs; encryption techniques used to compute final results

Geospatial Data Mining: Change Detection l Trained Neural Network to predict “new” pixel from “old” pixel - Neural Networks good for multidimensional continuous data - Multiple nets gives range of “expected values” l Identified pixels where actual value substantially outside range of expected values - Anomaly if three or more bands (of seven) out of range l Identified groups of anomalous pixels

Framework for Geospatial Data Security

Data Mining for Surveillance l We define an event representation measure based on low-level features l This allows us to define “normal” and “suspicious” behavior and classify events in unlabeled video sequences appropriately l A visualization tool can then be used to enable more efficient browsing of video data

Data Mining for Intrusion Detection Training Data Classification Hierarchical Clustering (DGSOT) Testing Testing Data SVM Class Training DGSOT: Dynamically growing self organizing tree SVM: Support Vector Machine

Information Assurance Education  Current Courses  Introduction to Information Security: Prof. Sha  Trustworthy Computing: Prof. Sha  Cryptography: Prof. Sudburough  Information Assurance: Prof. Yen  Data and Applications Security: Prof. Thuraisingham  Biometrics: Prof. Thuraisingham  Privacy: Prof. Murat Kantarcioglu  Future Courses  Network Security: Profs. Ventatesan, Sarac  Security Engineering: Profs. Bastani, Cooper  Digital Forensics: Prof. Venkatesan  Intrusion Detection: Prof. Khan  Digital Watermarking: Prof. Prabhakaran

Technical and Professional Accomplishments  Publications of research in top journals and conferences, books IEEE Transactions on Knowledge and Data Engineering, IEEE Transaction on Software Engineering, IEEE Computer, IEEE Transactions on Systems, Man and Cybernetics, IEEE Transactions on Parallel and Distributed Systems, VLDB Journal, 7 books published and 2 books in preparation including one on UTD research (Data Mining Applications, Awad, Khan and Thuraisingham)  Member of Editorial Boards/Editor in Chief Journal of Computer Security, ACM Transactions on Information and Systems Security, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Knowledge Engineering, Computer Standards and Interfaces  Advisory Boards / Memberships Purdue University CS Department,  Awards and Fellowships IEEE Fellow, AAAS Fellow, BCS Fellow, IEEE Technical Achievement Award, IEEE Senior Member, - - -