course projects examples guidelines suggestions. topics overview of project selected fall 2003...

36
Course Projects Examples Guidelines Suggestions

Upload: flora-ami-warren

Post on 05-Jan-2016

224 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Course Projects

Examples

Guidelines

Suggestions

Page 2: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Page 3: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Course Projects Undergraduate – group Graduate – individual Substantive investigation of some

aspect of security Approach may be experiment, data

analysis, system comparison, algorithm analysis, etc.

First due date: Monday, October 24

Page 4: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Survey of Intrusion Detection Systems

Comparison of IDSDifferent approachesDifferent products

27 pages, 7 referencesUndergraduates

Page 5: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

E-Commerce SecuritySurvey of client/server security

issues in e-commerceFirewalls, CGI, DatabasesPrivacy, Executable content

Unpaginated, 5 referencesUndergraduates

Page 6: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Computer Immune SystemsConsideration of some computer

security measures from the perspective of biological immune systems

Computer immunologyCfengineUnpaginated, 13 referencesGraduate

Page 7: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Locking in Transaction Processing

Transaction locking in database management systems

Emphasis on granularity and isolation levels

Some overlap with DBMS courses28 pages, 8 referencesGraduate

Page 8: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Commit Protocols in Multilevel Secure Distributed Database Systems

13 pages, 6 referencesGraduate

Page 9: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Statistical Database Security

Design and development of a Statistical Security Checker

Application to a simple (toy) medical DB

16 pages, 17 references, several screen printouts

Undergraduate

Page 10: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Digital WatermarkingUse of digital watermarking for

image authentication and copyright protection

Content-based watermarkingNew approach to digital

watermarking proposed18 pages, 5 referencesGraduate

Page 11: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Video WatermarkingOverview of video watermarkingUnpaginated, 10 referencesGraduate ?

Page 12: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Specialized Hardware for Deep Network Packet FilteringDesign of hardware IDS13 pages text, 12 references, ~30

pages codeGraduate

Page 13: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Wireless SecurityOverview of wireless securityRelated to CSCE 313, 491, and

other coursesExamines 802.1124 pages, 8 referencesUndergraduate

Page 14: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

XML Enabled Data Exchange with Anti-Tamper DatabasesStream-based approach to

encryption of XML documents23 pages, 14 referencesGraduate?

Page 15: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Survey of Security for Home and Small Business Computer UsersPlatform-independent methods to

secure a hostDebian GNU/LinuxWindows XP18 pages, 16 references

Page 16: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Constraint Satisfaction Problem in Agent-based Distributed Architecture

Related to e-commerceSecurity issues in an agent-based

environment19 pages, 20 references

Page 17: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Defense of Network Attacks on SecurityOverview of some managerial

issues16 pages, 5 references, 1 attached

article

Page 18: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Fall 2004 Projects

5 undergraduate group (2-4) projects

6 graduate projects

Page 19: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Undergraduate ProjectsPacket sniffing (4)Firewalls and VPNs (3)E-bay security (2)On-line transaction security (4)Steganography (4)

Page 20: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Graduate ProjectsSecurity in JavaPasswordsWeb application securityWireless networksAd hoc sensor networksPKI in e-commerceWi-Fi security

Page 21: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Defense of Network Attacks on SecurityOverview of some managerial

issues16 pages, 5 references, 1 attached

article

Page 22: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Some Approaches: Problems

Pick a real or potential problem. Try to find out how much of a problem it really is.

Pick a problem. Suggest a new or modified solution to it.

Page 23: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Some Approaches: Comparisons

Pick a class of objects (e.g. viruses, defense techniques, etc.) and compare them in detail.

Pick a set of algorithms and compare their performance.

Page 24: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Some SuggestionsCredibility of web pagesMalicious code on the webPrivacy preserving web miningModels of availability/confidentiality

tradeoffsFurther work with AWARE

Page 25: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Web Pages Uncontrolled Information on the web is uncontrolled A Google search can produce

Useful information Irrelevant information Out-of-date information Incorrect information Malicious information/programs

Page 26: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Credibility of Web Pages How can you tell if web information is

credible? Date, author, publisher, credentials

Human assessment Appearance of web page

User assessment Link patterns (hubs and spokes)

Automatic assessment

Page 27: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

WebCredSystem to assess credibility

automatically using criteria usually considered by people

Evaluated in medical domainRank comparable to human ranking

Wall Street JournalStanford University study

Page 28: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

WebCred Criteria Credentials

Association with AMA accredited medical school or selected federal agency

Advertising Check for doubleclick, ad.dom,

adv.dom Design

W3C’s online page validator

Page 29: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Malicious Code on the WebClicking on a link to a web page

may allow malicious code to install itself on your computer

Using e-commerce sites may result in spyware installing itself on your computer

How likely is this?How can you protect yourself?

Page 30: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Privacy Preserving Web MiningCan privacy be preserved in the

presence of web miningProblem similar to that seen in

statistical databases

Page 31: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Availability TradeoffsSecurity in MLS databases

MLS = Multilevel securityMix of data at different security

levelsIssue of granularity – how much

information is protectedSmall granules -> more availabilityLarge granules -> less availability

Page 32: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

An Example E [Name, Rank, Salary, Department] Two levels:

Everything ok Can not associate specific name/salary

Easy solution: Restrict access to Salary Reduced availability

More complex solution: Allow accesses that don’t allow inference of specific Name/Salary pair More complex, higher availability

Page 33: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

AWAREA Windows Attack IntRusion

Emulator Runs a simulated Windows

environment on top of an actual Windows environment

Simulated attacks affect the emulation, not the underlying system

Page 34: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Major ComponentsAttack inventoryAttack generatorAttack simulatorSimulation evaluator

Page 35: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Attack FootprintRogue processes Files/directoriesRegistry modificationsPort openingsFirewall log entriesChange in services

Page 36: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Simulation ToolsNetstatInternet ExplorerRegistry EditorSearchServices.mscTask ManagerWindows Explorer