Download presentation
Presentation is loading. Please wait.
Published byDenis Jennings Modified over 9 years ago
1
Data and Applications Security Research at the University of Texas at Dallas Dr. Bhavani Thuraisingham The University of Texas at Dallas April 25, 2006
2
Cyber Security Research Areas at UTD Network Security Secure wireless and sensor networks Systems and Language Security Embedded systems security, Buffer overflow defense Data and Applications Security Information sharing, Geospatial data management, Surveillance, Secure web services, Privacy, Dependable information management, Intrusion detection Security Theory and Protocols Secure group communication Security Engineering Secure component-based software Cross Cutting Themes Vulnerability analysis, Access control
3
Research Group: Data and Applications Security l Core Group - Prof. Bhavai Thuraisingham (Professor & Director, Cyber Security Research Center) - Prof. Latifur Khan (Director, Data Mining Laboratory) - Prof. Murat Kantarcioglu (Joined Fall 2005, PhD. Purdue U.) - Prof. Kevin Hamlen (will join Fall 2006 from Cornell U.) l Students and Funding - 10 PhD Students, 16 MS students - Research grants (Since 2005) Air Force Office of Scientific Research Center, Raytheon Corporation, Nokia Corporation and proposals submitted to NSF, DHS, etc. - Our Vision: l Assured Information Sharing, Secure Geospatial data management, Video Surveillance
4
Vision 1: Assured Information Sharing Publish Data/Policy Component Data/Policy for Agency A Data/Policy for Coalition Publish Data/Policy Component Data/Policy for Agency C Component Data/Policy for Agency B Publish Data/Policy 1.Friendly partners 2.Semi-honest partners 3.Untrustworthy partners
5
Vision 2: Secure Geospatial Data Management Data Source A Data Source B Data Source C SECURITY/ QUALITY Semantic Metadata Extraction Decision Centric Fusion Geospatial data interoperability through web services Geospatial data mining Geospatial semantic web Tools for Analysts Discussions on collaborative research between UTD, OGC (Open Geospatial Consortium), Oracle and Raytheon
6
Vision 3: Surveillance and Privacy Raw video surveillance data Face Detection and Face Derecognizing system Suspicious Event Detection System Manual Inspection of video data Comprehensive security report listing suspicious events and people detected Suspicious people found Suspicious events found Report of security personnel Faces of trusted people derecognized to preserve privacy
7
Example Projects l Assured Information Sharing - Secure Semantic Web Technologies - Social Networks - Privacy Preserving Data Mining l Geospatial Data Management - Geospatial data mining - Geospatial data security l Surveillance - Suspicious Event Detention - Privacy preserving Surveillance - Automatic Face Detection l Cross Cutting Themes - Data Mining for Security Applications (e.g., Intrusion detection, Mining Arabic Documents); Dependable Information Management
8
Secure Semantic Web Policies Ontologies Rules Semantic Web Engine XML, RDF Documents Web Pages, Databases Inference Engine/ Rules Processor Interface to the Semantic Web Technology At UTD
9
Social Networks l Individuals engaged in suspicious or undesirable behavior rarely act alone l We can infer than those associated with a person positively identified as suspicious have a high probability of being either: - Accomplices (participants in suspicious activity) - Witnesses (observers of suspicious activity) l Making these assumptions, we create a context of association between users of a communication network
10
Privacy Preserving Data Mining l Prevent useful results from mining - Introduce “cover stories” to give “false” results - Only make a sample of data available so that an adversary is unable to come up with useful rules and predictive functions l Randomization and Perturbation - Introduce random values into the data and/or results - Challenge is to introduce random values without significantly affecting the data mining results - Give range of values for results instead of exact values l Secure Multi-party Computation - Each party knows its own inputs; encryption techniques used to compute final results
11
Geospatial Data Mining: Change Detection l Trained Neural Network to predict “new” pixel from “old” pixel - Neural Networks good for multidimensional continuous data - Multiple nets gives range of “expected values” l Identified pixels where actual value substantially outside range of expected values - Anomaly if three or more bands (of seven) out of range l Identified groups of anomalous pixels
12
Framework for Geospatial Data Security
13
Data Mining for Surveillance l We define an event representation measure based on low-level features l This allows us to define “normal” and “suspicious” behavior and classify events in unlabeled video sequences appropriately l A visualization tool can then be used to enable more efficient browsing of video data
14
Data Mining for Intrusion Detection Training Data Classification Hierarchical Clustering (DGSOT) Testing Testing Data SVM Class Training DGSOT: Dynamically growing self organizing tree SVM: Support Vector Machine
15
Information Assurance Education Current Courses Introduction to Information Security: Prof. Sha Trustworthy Computing: Prof. Sha Cryptography: Prof. Sudburough Information Assurance: Prof. Yen Data and Applications Security: Prof. Thuraisingham Biometrics: Prof. Thuraisingham Privacy: Prof. Murat Kantarcioglu Future Courses Network Security: Profs. Ventatesan, Sarac Security Engineering: Profs. Bastani, Cooper Digital Forensics: Prof. Venkatesan Intrusion Detection: Prof. Khan Digital Watermarking: Prof. Prabhakaran
16
Technical and Professional Accomplishments Publications of research in top journals and conferences, books IEEE Transactions on Knowledge and Data Engineering, IEEE Transaction on Software Engineering, IEEE Computer, IEEE Transactions on Systems, Man and Cybernetics, IEEE Transactions on Parallel and Distributed Systems, VLDB Journal, 7 books published and 2 books in preparation including one on UTD research (Data Mining Applications, Awad, Khan and Thuraisingham) Member of Editorial Boards/Editor in Chief Journal of Computer Security, ACM Transactions on Information and Systems Security, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Knowledge Engineering, Computer Standards and Interfaces - - - Advisory Boards / Memberships Purdue University CS Department, - - - Awards and Fellowships IEEE Fellow, AAAS Fellow, BCS Fellow, IEEE Technical Achievement Award, IEEE Senior Member, - - -
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.