Top Banner
Center for Security Technologies Joseph A. OSullivan, PhD Electrical and Systems Engineering Associate Director, Center for Security Technologies Chair, Faculty Senate Director, Electronic Systems & Signals Research Laboratory
60

Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

May 22, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Center for Security Technologies

Joseph A. O’Sullivan, PhD

Electrical and Systems Engineering

Associate Director, Center for Security Technologies

Chair, Faculty Senate

Director, Electronic Systems & Signals Research Laboratory

Page 2: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:
Page 3: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Introduction to the Center for Security Technologies

• Washington UniversityCenter for Security

Technologies• Example Projects

• Advisory Board• Conclusions

Page 4: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Center for Security Technologies

Ronald Indeck Joseph O’Sullivan Robert PlessDirector Associate Director Assistant Director

Page 5: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Washington University and theCenter for Security Technologies

Securing our World through Technology• Washington University

– USNWR: ranked 9th nationally, top 10 in endowment– 8 Schools: Medicine, Social Work ranked in the top 3

• CST– interdisciplinary academic research center (5 schools)– built on existing strengths

in security research

Page 6: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

CST MissionTo advance research in basic science, mathematics, and engineering in those areas which can most directly improve security including:• physical aspects of security

(intrusion detection, border security, biological and chemical substance identification)

• information aspects of security (networking, searching of massive databases, and information theory)

• law, economics, public policyand to transfer these technologies into practice

Page 7: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

CST Scope• First interdisciplinary security

research center– 50 faculty from five schools– More than cybersecurity– More than counterterrorism

• A variety of ‘attacks’ including natural disasters

– Integrate research • Through projects and testbeds• Across disciplines, schools• Sensors Processing Systems Integration Technology

Transfer

• Synergy between technology and policy– Privacy/public policy as ‘design criteria’

Page 8: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Center for Security Technologies Broader Vision

• Planned and Unplanned Events– Event detection: technology– Event classification: science– Coordinated response:

science, technology, and policy• The Role of Academics

– Science and technology research and development

– Role of policy, economics, law

Page 9: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

CST Research and Applications

• Sensors through signal processing to implementations

• Security of food, water, access, network, borders

• Information awareness• Synergy between technology and policy• Systems integration leading to technology

transfer

Page 10: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

CST Goals

• Establish critical mass in security technologies• Address fundamental scientific and engineering

issues• Integrate economic and privacy issues• Manage many complementary projects• Realize widespread applications• Transition University technology into practical use• Guide standards and impact policy• Build synergy between WUSTL, region, and nation

Page 11: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Knowledge Dissemination

• Peer-reviewed publications• Conference presentations, publications• Industry and government meetings

– Individual– Group or small conference

• Patents and licensing• Contracts to work with industry• Formation of new companies

Page 12: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Example Project:Magneprint

• Scientific measurements in late 1980’s– Repeatability of magnetic noise– Papers published– Range of applications identified; patents

• Use in magnetic recording– Novel recording technologies to exploit microstructure;

papers and patents– Eventually reached no commercialization

• Use in combating credit card fraud– Patents– Partner with Magtek– Chips and systems developed at Washington University– Successful field trials in Malaysia; potential world-wide– Extensions: identification cards, container security

Page 13: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

A bit about Bytes

• 1’s and 0’s: a trim alphabet• bits and Bytes: usually 8 bits/Byte• kilo, Mega, Giga, Tera, Peta, Exa: 103

– kilobyte: printed page of text– Megabyte: novel– Gigabyte: movie– Terabyte: US library of Congress – Petabyte: all US academic research libraries– Exabyte: every word produced by humans

1011100110101011110010314- 935- 4767

Page 14: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Massive Data

• Storage industry will ship 6,000,000,000,000,000,000 Bytes this year;– Cost decreasing ~3%/week;

• MasterCard recently installed 200 TBytes of disk;

• Humanoids have produced 12 Exabytes over the past ~30,000 years– Next 12 Exabytes in just over a year!

Page 15: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Application: Intelligence Data

• Lots of data– US intelligence collects data equaling the printed

collection of the US Library of Congress every day!

• Changing constantly• Many perturbations

– Osama, Osamma, Ossamma, . . .

• Query and field types aren’t known a priori

Page 16: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Application: Image Databases

Challenging database– Massive data sets– Unstructured– Don’t know what we need to look

for in each picture

Page 17: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Project Status• DSSI Formed in 2003• Housed in Center for Emerging

Technologies• http://www.datasearchsystems.com/

Page 18: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

CST External Advisory BoardMr. Earle Harbison (retired President and COO, Monsanto), ChairDr. Massoud Amin (Director of Infrastructure Security, EPRI)Dr. Allen Atkins (Vice President, Boeing)Dr. Tony Cantu (Chief Scientist, US Secret Service)Mr. Scott Charney (CSO, Microsoft)Prof. Jerry Cox (Senior Professor, Washington University)Col. Tim Daniel (Director, Missouri Office of Homeland Security)Mr. Will Eatherton (Chief Architect, Cisco)Mr. Richard Fleming (CEO, RCGA)Mr. Jerry McElhatton (President GTO, MasterCard International)Dr. Sharon Nunes (Vice President, IBM)Mr. Joe Leonelli (Vice President, Veridian Systems)Gen. Tony Robertson (retired AF)Dr. Don Ross (Chairman, Ross and Baruzzini: Cernium)Dr. Robert Thibadeau (CSO, Seagate Technologies)Hon. William Webster (retired Director, CIA and FBI)Prof. Murray Wedeinbaum (Washington University)

Page 19: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Information Hiding

U.S. officials say Osama bin Laden is posting instructions for terrorist activities on sports chat rooms, pornographic bulletin boards and other Web sites.

(AP News)

Page 20: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Steganography in Text

We start with plaintext:We explore new steganographic and

cryptographic algorithms and techniques throughout the world to produce wide variety and security in the electronic web called the Internet.

Page 21: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Steganography in Text

. . . and apply a word shifting algorithm:We explore new steganographic and

cryptographic algorithms and techniques throughout the world to produce wide variety and security in the electronic web called the Internet.

Page 22: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Steganography in Text

. . . and uncover:We explore new steganographic and

cryptographic algorithms and techniques throughout the world to produce wide variety and security in the electronic web called the Internet.

. . . explore the world wide web . . .

Page 23: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Steganography in Pictures

Renoir

Page 24: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Covert Data

Long-range Aviation Airfield

Page 25: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

‘Composite’ Image

Page 26: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Undetectable (unless aware)

Original Composite

Page 27: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Digital Fingerprinting andTraitor Tracing

• Digital fingerprinting– Authenticate– Who bought/sold/ . . .– Printers/copiers

• Mark copies to find out where the data are being compromised

Page 28: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Bootleg copies of Oscar-nominated movies showing up on Internet

AP Jan. 14, 2004“The Last Samurai,” “Something's Gotta Give,” “Cold Mountain,”“House of Sand and Fog”

– “The Los Angeles Times reported that security features on the tape [Cold Mountain] indicated that it belonged to Ivan Kruglak, an academy member and president of a wireless data communications company.” AP Jan. 15, 2004– Fingerprinting based on Philips Research Lab Technology

Page 29: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Oscar Bootlegs 2004– Fri Jan 16, 2:12 AM ET By Gregg Kilday and Paul Bond (Hollywood Reporter) – FBI confirmed involvement– "Something's Gotta Give," "The Last Samurai," "Master and Commander: The Far Side of the World" and "thirteen." – “Illegal copies … have been traced … to character actor Carmine Caridi, a member of the Academy of Motion Picture Arts and Sciences”– “It was a pretty professional job… all visible markings were removed.”– “This year the screeners carried invisible markings for the first time; the studios were able to identify the Academy member for whom they had been intended.”

Page 30: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Consider . . .

This process can perfectly hide data so that no one, not even the ‘good guys’, can find it.

What about teens and music ‘sharing’?

Page 31: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

The Balancing Act Between Privacy and Security

• Information Searches: Security and Privacy

• Information Hiding: Steganography and Copyright Protection

• Cameras and Sensing

Page 32: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Policy Analysis

Understanding the Liberty/Security Space– Tradeoffs between liberty and security?– Plot the space

Page 33: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Where is a given policy with respect to a theoretically optimal frontier?

Policy Analysis

Page 34: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

• Implications for new technologies?

– Some offer more “L” or more “S”

– What if we offer BOTH?– Use this as a design

criterion!– CST Examples

Policy Analysis

The CST is doing for security what imaging has done for medicine

Page 35: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Information

• Generation and storage• Transmission• Securing of information

– . . . security ↔ privacy

Page 36: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Satellite Data

• Low orbit fly-over every 90 minutes• Look for differences in images

– Large objects– Troops– Changes to landscape

• Flag, transmit these differences immediately• National Reconnaissance Office• City assessors . . .

Page 37: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

How do we find what we’re looking for most effectively?!

Page 38: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Task: Search all Books in the Library for a Particular Word

Process:• Transfer books to home• Read each one• Keep those interested• Go get more books . . .

Page 39: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

To find what we’re looking formost effectively . . .

. . . push the request to the data!

Page 40: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

• Security & intelligence

• Medical & genomics

• Internet & search engines

• Unstructured data: Text, images & signals

• Personal & server computers

Dramatic Performance Gains –200x (per device)

Page 41: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Example: The Case of Maury Travis

Suspect in over 20 murders

Sent map to Post-Dispatch

Contacted Expedia (M’Soft)

ID’ed IP address

Contacted MCI-Worldcom

Tailed him . . . Apprehended!

Per Sgt. Muffler

Page 42: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Questions:• Who has access to these data?

– Who grants access?– Can we search blindly then obtain court order?

• Consider medical records:– Can be an incredible medical research tool– Can be ‘useful’ for insurance actuaries

Page 43: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Data Transmission

• 120 TBytes/sec internet peak rate• 120 PBytes/month Internet• 100 PBytes/month telephone

Page 44: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

What’s the problem?

– Computer virus infections are spreading• New virus spreads though email and web

– Copyrights on digital content are violated• Rampant sharing of music and videos

– Confidential data are leaking through company networks

• Trade secrets stolen

– Internet infrastructure is at risk

Page 45: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

What needs to be done?

Distinguish between legitimate and illegitimate content– Stop the illegitimate traffic– Forward legitimate traffic – Don’t slow down the network

Page 46: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

A Potential Solution:The Network Watchman

• Electronic postmen– direct packets to destination via headers

• Secure network– watch headers– view payload– copy/redirect/stop packets

• Identifies & acts on content in Internet packets without delay

Page 47: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

What Can We Do Now?

• Routinely update system software, especially security patches

• Enable your firewall, especially wireless

Page 48: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Concerns

• Who is allowed to read your email or monitor your buying habits?– Law enforcement officers? Marketers?– Compare to paper mail or telephone; store

card purchasing data

• Who controls and supervises this access?– Legislature? Public interest groups?

Page 49: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Smart Borders – Smart Cameras

Page 50: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Surveillance in aDynamic Environment

Conventional motion detection ineffective

Page 51: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Background Model Training

Learning the environment

Page 52: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Anomalous Motion Detection

After 15 seconds of training

Page 53: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

X-ray Scanning andSecurity Imaging

Conventional Transmission

Page 54: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Scanning at Borders/Airports

Low Energy Backscattered

Behavior Analysis

Page 55: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Network of Video Cameras• Missouri Rapid Screen• License plate ID system

– consider sniper case

Page 56: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Thoughts

• Do you want to be in these pictures?– It might demonstrate your innocence– Ubiquitous covert cameras in watches, cell

phones

• Consider the AVID chip– Think about cell phone ‘tracking’!

Page 57: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

Safe at Home

• Technology expected to (and will!) respond with improved solutions to new threats– applies to both planned and natural attacks

• Coordinate with law, privacy, economics, and public policy– expect that reason will be applied

cst.wustl.edu

Page 58: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

THANKS!

Page 59: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection:

. . . many other doors at WUSTL!

Page 60: Center for Security Technologiesessrl.wustl.edu/~jao/Talks/CSTTalks/TSWGkickoff.pdfCenter for Security Technologies Broader Vision • Planned and Unplanned Events – Event detection: