Top Banner
Course Projects Examples Guidelines Suggestions
36

Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Jan 05, 2016

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Course Projects

Examples

Guidelines

Suggestions

Page 2: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments

Page 3: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Course Projects Undergraduate – group Graduate – individual Substantive investigation of some

aspect of security Approach may be experiment, data

analysis, system comparison, algorithm analysis, etc.

First due date: Monday, October 24

Page 4: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Survey of Intrusion Detection Systems

Comparison of IDSDifferent approachesDifferent products

27 pages, 7 referencesUndergraduates

Page 5: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

E-Commerce SecuritySurvey of client/server security

issues in e-commerceFirewalls, CGI, DatabasesPrivacy, Executable content

Unpaginated, 5 referencesUndergraduates

Page 6: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Computer Immune SystemsConsideration of some computer

security measures from the perspective of biological immune systems

Computer immunologyCfengineUnpaginated, 13 referencesGraduate

Page 7: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Locking in Transaction Processing

Transaction locking in database management systems

Emphasis on granularity and isolation levels

Some overlap with DBMS courses28 pages, 8 referencesGraduate

Page 8: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Commit Protocols in Multilevel Secure Distributed Database Systems

13 pages, 6 referencesGraduate

Page 9: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Statistical Database Security

Design and development of a Statistical Security Checker

Application to a simple (toy) medical DB

16 pages, 17 references, several screen printouts

Undergraduate

Page 10: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Digital WatermarkingUse of digital watermarking for

image authentication and copyright protection

Content-based watermarkingNew approach to digital

watermarking proposed18 pages, 5 referencesGraduate

Page 11: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Video WatermarkingOverview of video watermarkingUnpaginated, 10 referencesGraduate ?

Page 12: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Specialized Hardware for Deep Network Packet FilteringDesign of hardware IDS13 pages text, 12 references, ~30

pages codeGraduate

Page 13: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Wireless SecurityOverview of wireless securityRelated to CSCE 313, 491, and

other coursesExamines 802.1124 pages, 8 referencesUndergraduate

Page 14: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

XML Enabled Data Exchange with Anti-Tamper DatabasesStream-based approach to

encryption of XML documents23 pages, 14 referencesGraduate?

Page 15: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Survey of Security for Home and Small Business Computer UsersPlatform-independent methods to

secure a hostDebian GNU/LinuxWindows XP18 pages, 16 references

Page 16: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Constraint Satisfaction Problem in Agent-based Distributed Architecture

Related to e-commerceSecurity issues in an agent-based

environment19 pages, 20 references

Page 17: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Defense of Network Attacks on SecurityOverview of some managerial

issues16 pages, 5 references, 1 attached

article

Page 18: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Fall 2004 Projects

5 undergraduate group (2-4) projects

6 graduate projects

Page 19: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Undergraduate ProjectsPacket sniffing (4)Firewalls and VPNs (3)E-bay security (2)On-line transaction security (4)Steganography (4)

Page 20: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Graduate ProjectsSecurity in JavaPasswordsWeb application securityWireless networksAd hoc sensor networksPKI in e-commerceWi-Fi security

Page 21: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Defense of Network Attacks on SecurityOverview of some managerial

issues16 pages, 5 references, 1 attached

article

Page 22: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Some Approaches: Problems

Pick a real or potential problem. Try to find out how much of a problem it really is.

Pick a problem. Suggest a new or modified solution to it.

Page 23: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Some Approaches: Comparisons

Pick a class of objects (e.g. viruses, defense techniques, etc.) and compare them in detail.

Pick a set of algorithms and compare their performance.

Page 24: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Some SuggestionsCredibility of web pagesMalicious code on the webPrivacy preserving web miningModels of availability/confidentiality

tradeoffsFurther work with AWARE

Page 25: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Web Pages Uncontrolled Information on the web is uncontrolled A Google search can produce

Useful information Irrelevant information Out-of-date information Incorrect information Malicious information/programs

Page 26: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Credibility of Web Pages How can you tell if web information is

credible? Date, author, publisher, credentials

Human assessment Appearance of web page

User assessment Link patterns (hubs and spokes)

Automatic assessment

Page 27: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

WebCredSystem to assess credibility

automatically using criteria usually considered by people

Evaluated in medical domainRank comparable to human ranking

Wall Street JournalStanford University study

Page 28: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

WebCred Criteria Credentials

Association with AMA accredited medical school or selected federal agency

Advertising Check for doubleclick, ad.dom,

adv.dom Design

W3C’s online page validator

Page 29: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Malicious Code on the WebClicking on a link to a web page

may allow malicious code to install itself on your computer

Using e-commerce sites may result in spyware installing itself on your computer

How likely is this?How can you protect yourself?

Page 30: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Privacy Preserving Web MiningCan privacy be preserved in the

presence of web miningProblem similar to that seen in

statistical databases

Page 31: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Availability TradeoffsSecurity in MLS databases

MLS = Multilevel securityMix of data at different security

levelsIssue of granularity – how much

information is protectedSmall granules -> more availabilityLarge granules -> less availability

Page 32: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

An Example E [Name, Rank, Salary, Department] Two levels:

Everything ok Can not associate specific name/salary

Easy solution: Restrict access to Salary Reduced availability

More complex solution: Allow accesses that don’t allow inference of specific Name/Salary pair More complex, higher availability

Page 33: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

AWAREA Windows Attack IntRusion

Emulator Runs a simulated Windows

environment on top of an actual Windows environment

Simulated attacks affect the emulation, not the underlying system

Page 34: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Major ComponentsAttack inventoryAttack generatorAttack simulatorSimulation evaluator

Page 35: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Attack FootprintRogue processes Files/directoriesRegistry modificationsPort openingsFirewall log entriesChange in services

Page 36: Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.

Simulation ToolsNetstatInternet ExplorerRegistry EditorSearchServices.mscTask ManagerWindows Explorer