1 / 16

Practically Useful Network Security

Practically Useful Network Security. Chin-Tser Huang huangct@cse.sc.edu University of South Carolina. Confidentiality Integrity Authentication Anti-replay …. Availability Access control Non-repudiation Anonymity. Security Services. Network Security Always Good?.

megara
Download Presentation

Practically Useful Network Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Practically Useful Network Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina

  2. Confidentiality Integrity Authentication Anti-replay … Availability Access control Non-repudiation Anonymity Security Services

  3. Network Security Always Good? • What if security mechanism is not applied correctly?

  4. Network Security Always Good? • What if security mechanism is not applied appropriately? AESk3(3DESk1,k2(m, ts)) 3DESk1,k2(m, ts) m, ts AESk3(3DESk1,k2(m, ts)) AESk3(3DESk1,k2(m, ts)) x y

  5. Practically Useful Network Security • To make network security practically useful, we need to • Verify the correctness of security mechanism • Consider the efficiency of security mechanism

  6. Protocol Design and Verification • Correctness is essential for secure protocols • Two steps to verify correctness of protocols • First specify protocols using a formal and scalable notation • Then verify correctness of protocol using state transition diagram

  7. Abstract Protocol Notation

  8. State Transition Diagram

  9. Botnet Detection and Mitigation • Supported by NSF and AFRL • Ongoing collaboration with Dr. Han at AFRL • Botnet is a distributed network of a large number of bots, which are machines infected with malware and under the control of a botmaster

  10. Botnet Detection and Mitigation • Aim to mitigate the problem of botnets by filtering their malicious packets and command and control (C&C) packets early • Successful implementation on Quagga routing software • Currently developing Tcl/Tk scripts for automated rule dissemination between routers • With Prasanth Kalakota, Mohamed Sharaf and Dr. Matthews

  11. Early Filtering Testbed • Four Cisco 2811 routers • Dell PowerEdge R410 server

  12. Intrusion Detection • Supported by a DARPA/AFRL grant • Microscope • View network as a collection of individual hosts • Charge individual host for anomalous behavior • With Jeff Janies A B C D

  13. Intrusion Detection • Macroscope • View network traffic as time-series signal • Use wavelets to capture different types of anomalies • With Sachin Thareja

  14. Authentication in Wireless Networks • Design secure unicasting protocol to counter routing level attacks in ad hoc sensor networks • Develop dual authentication protocol against rogue access points for 802.11 WLANs • Discover and fix security problems in 802.16 WiMAX PKM protocols • With Jeff Janies, Sen Xu, and Prof. Matthews

  15. Privacy-Preserving Multi-Dimensional Credentialing • Organizations often use common personal identifiers (PIs) to satisfy reporting obligations and uniquely identify the same individuals, thereby making it possible to cross-link and aggregate the transactions of the same person from multiple sources • Introduce the veiled certificate (VC)which allows individuals to maintain control over their personal information while satisfying the regulatory andreporting needs of today’s security consciousenvironment • With Prof. Gerdes

  16. More Information • Secure Protocol Implementation & Development (SPID) Group • Website: http://spid.cse.sc.edu

More Related