Presentation is loading. Please wait.

Presentation is loading. Please wait.

High Performance Computing Lab.

Similar presentations


Presentation on theme: "High Performance Computing Lab."— Presentation transcript:

1 High Performance Computing Lab.
Computer Science and Engineering Pohang University of Science and Technology Home Page :

2 Introduction HPC Research Area People Ongoing Projects
High Performance Computing People Professor : Sung Je Hong, Jong Kim Ph. D. Students : 6 M.S. Students : 13 (CSE), 4 (EEE) Researchers : 2 Research Area Information Security Internet Worm Peer-to-Peer Mobile Computing VLSI Design Ongoing Projects ESM HackSim XKMS ITS Home Network

3 Information Security Goals Research Items Applications
Research Area (1/5) Information Security Goals To deal with security issues in information technology Research Items Secure workflow model related on Web Services Trust management in distributed systems Digital right management and copyrights protection Authorization and authentication in Grid Applications Business process on Web Services Cooperative modification of contents in Wiki and Blog

4 Internet Worm Goals Research Items Applications Research Area (2/5)
To analyze worm traffic pattern and study worm detection mechanisms Research Items Worm propagation model Detecting worms Preventing worm propagation Worm monitoring Applications Worm alarm systems Internet worm detection/prevention systems

5 Peer-to-Peer Goals Research Items Applications Research Area (3/5)
To study peer-to-peer technology including range query, lookup, and reputation Research Items Range query in structured P2P Hierarchical P2P systems for an efficient Lookup service P2P reputation management based on DHT (Distributed Hash Table) Applications Directory services in the Grid computing P2P file sharing application E-commerce such as E-bay and Auction

6 Mobile Computing Goals Research Items Applications Research Area (4/5)
To investigate IP mobility and QoS in mobile environments Research Items Mobile QoS routing protocol Mobile multicast routing protocol Location management for micro mobility in Mobile IP Applications Mobile internet Mobile multimedia services Mobile TV & Radio

7 VLSI Design Goals Research Items Applications Research Area (5/5)
To design VLSI chips for specific applications To develop high-speed VLSI design methods Research Items Testing circuit design Design for test Low power chip design Applications SoC (System on Chip) VLSI chip design

8 Enterprise Security Management
Ongoing Projects (1/5) Enterprise Security Management Goal To analyze log information collected from diverse security systems System architecture Log Collection Part Log & Response Log Management Part GUI Management Part 메모리 사용률 IDS FIREWALL CPU 사용률 External Network Firewall Log IDS Log Agent Part Normalization Viewer Rule Editing Vulnerability Test Policy Configuration Vaccine Log Network Info Event log Syslog SNMP Unsecure Network SNMP Trapd IDS Log Analysis (Correlation & Filtering) Meta Alert Attack Sequence Detection Multi Log Analysis

9 Automation of Penetration Testing
Ongoing Projects (2/5) Automation of Penetration Testing Goal To develop penetration testing tool for window vulnerability System architecture

10 register revoke reissue b-register b-revoke
Ongoing Projects (3/5) XML Key Management Goal To develop a Web service for XML key management that makes a conventional PKI operation simple System architecture Trust Service Client X509 Agent CA Service DB LDAP OCSP SPKI Agent PGP Agent XKMS locate validate register revoke reissue b-register b-revoke CMP Agent Layer recover

11 Intrusion Tolerant System
Ongoing Projects (4/5) Intrusion Tolerant System Goal To construct a system that can tolerate systems/network infrastructure against malicious behavior Plan Intrusion Response Detection/Recovery Reducing delay Design methodology of S/W Effective replication mechanism Intrusion tolerance of structured P2P Distributed system based on p2p Service model of intrusion tolerance Practical Intrusion Tolerance Distributed service model /prototype of System

12 Access Control in Home Network
Ongoing Projects (5/5) Access Control in Home Network Goal To present an access control policy model that can coordinate each middleware of home network without any standard System architecture Home Server Authentication Module User 1. Request Authentication & Service 2. Map User to role 5. Provide Service Role based Access Control Module Service device 4. Permit service 3. Check user (role) permission


Download ppt "High Performance Computing Lab."

Similar presentations


Ads by Google