Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.

Slides:



Advertisements
Similar presentations
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #21 Privacy March 29, 2005.
Advertisements

Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Building Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Semantic web technologies for secure interoperability and.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Data Management Information Management Knowledge Management Data and Applications Security Challenges Bhavani Thuraisingham October 2006.
Data Mining for Security Applications Dr. Bhavani Thuraisingham The University of Texas at Dallas January 2006.
Data and Applications Security Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security August.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Information Security Analytics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course.
1 Data Mining for Surveillance Applications Suspicious Event Detection Dr. Bhavani Thuraisingham April 2006.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Data Mining for Security Applications Dr. Bhavani Thuraisingham Dr. Doug Harris The University of Texas at Dallas March.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #2 Information Security August 24, 2005.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data.
Data and Applications Security Research at the University of Texas at Dallas Dr. Bhavani Thuraisingham The University of Texas at Dallas April 25, 2006.
Data and Applications Security (DAS) Research at UTD Dr. Bhavani Thuraisingham The University of Texas at Dallas 19 June 2006.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Secure Multimedia Data.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Inference Problem - I September.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Biometrics and Other Emerging Technologies in Applications.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Security for Distributed Data Management.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security and Digital Forensics.
Dr. Bhavani Thuraisingham January 14, 2011 Building Trustworthy Semantic Webs Lecture #1: Introduction to Trustworthy Semantic Web.
Trustworthy Semantic Web Dr. Bhavani Thuraisingham The University of Texas at Dallas Inference Problem March 4, 2011.
Data Security and Integrity Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas June 2009.
Data Mining for Surveillance Applications Suspicious Event Detection Dr. Bhavani Thuraisingham.
Information Security Analytics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #25 Dependable Data Management.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #11 Secure Heterogeneous.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Dependable Data Management April.
Data and Applications Security
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Trustworthy Semantic Webs
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Trustworthy Semantic Web
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security Developments and Directions
Data and Applications Security
Presentation transcript:

Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani Thuraisingham Director, CyberSecurity Research Center Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas January 30, 2006

Erik Jonsson School of Engineering and Computer Science Cyber Security/Information Assurance Research Areas  Network Security Secure wireless and sensor networks  Systems and Language Security Embedded systems security, Buffer overflow defense  Data and Applications Security Secure web services, Semantic Grids, Privacy  Intrusion Detection Data mining techniques for intrusion detection  Security Theory and Protocols Secure group communication  Security Engineering Secure component-based software  Cross Cutting Themes Vulnerability analysis, Access control

Erik Jonsson School of Engineering and Computer Science Data and Applications Security Research  Secure Data Sharing Across Coalitions Organizations share data and yet maintain theory autonomy and enforce policies  National Security and Privacy Privacy-preserving data mining and surveillance techniques  Dependable Semantic Webs Next generation semantic web technologies with security and trust management  Secure Geospatial/Multimedia Information Systems Authorization Models for Image and Video systems

Erik Jonsson School of Engineering and Computer Science Secure Data Sharing among Coalitions: Export Data/Policy Component Data/Policy for Agency A Data/Policy for Coalition Export Data/Policy Component Data/Policy for Agency C Component Data/Policy for Agency B Export Data/Policy

Erik Jonsson School of Engineering and Computer Science Privacy Preserving Data Mining: Data Mining causes Privacy Violations Randomization –Introduce random values into the data and/or results –Challenge is to introduce random values without significantly affecting the data mining results Privacy preserving link analysis

Erik Jonsson School of Engineering and Computer Science Secure Semantic Web: Confidentiality, Privacy and Trust Policies Ontologies Rules Semantic Web Engine XML, RDF Documents Web Pages, Databases Inference Engine/ Rules Processor Interface to the Semantic Web Technology Being developed at UTD

Erik Jonsson School of Engineering and Computer Science Determine normal events Determine suspicious events Analyze video and image data and determine whether events are suspicious Suspicious Event Detection

Erik Jonsson School of Engineering and Computer Science Suspicious Event Detection We define an event representation measure based on low-level features Having a well-defined event representation allows us to compare events. Our desired effect is that video events that contain the same semantic content will have small dissimilarity from one another (i.e. be perceived as the same event). This allows us to define “normal” and “suspicious” behavior and classify events in unlabeled video sequences appropriately A visualization tool can then be used to enable more efficient browsing of video data

Erik Jonsson School of Engineering and Computer Science Social Network Analysis Suspicious Message Detection –Adaptation of existing spam detection techniques Naïve Bayesian Classification Support Vector Machines Keyword Identification Detecting chains of conversation through message correlation analysis –Determination of word frequencies within a message –Comparison between existing suspicious messages

Erik Jonsson School of Engineering and Computer Science ? Financial Aid Information (P3) Office of admission (P1) VIP web page (P2) What page is Next?? Web Page Prediction

Erik Jonsson School of Engineering and Computer Science Images Segments Blobs Automatically annotate images then retrieve based on the textual annotations. Image Annotation and Extraction

Erik Jonsson School of Engineering and Computer Science Geospatial Data Integration

Erik Jonsson School of Engineering and Computer Science Dependable Information Management Many DoD and DoE systems have to meet timing constraints Sensor/Stream data has to be processed within a certain time and sent to the war fighter Security and real-time processing may be conflicting requirements Need flexible policies

Erik Jonsson School of Engineering and Computer Science In Conclusion We need to develop infrastructures middleware and applications that are end-to-end secure We need confidentiality, privacy, trust, integrity, fault tolerance and real0time processing Flexible policies are critical Need Risk-based access control