SlideShare a Scribd company logo
1 of 18
MS
I
Information Assurance and Security
Eugene Spafford
Professor
Department of Computer Sciences
Purdue University
MS
I
2
Outline
 Security at Purdue, COAST/CERIAS
 Resources, Sponsors
 Ongoing Research Projects
 Proposed QoS Research
MS
I
3
Information Security At Purdue
 Information Security started in 1979
 Many courses offered (grad, undergrad)
 COAST (1992-97)
 CERIAS (1998)
• University-wide
• Multidisciplinary
MS
I
4
Center Resources
 32 Sun Workstations
 2 Sun Enterprise Servers
 9 MacOS Platforms
 FORE ATM cloud
• 40 host adapters
• 2 BX200
• 4 FORErunners
 3 486/586 PCs w/Win 95
 4 Pentium Pro BSDI/Linux
 12 Pentium II WinNT
 5 HP Printers
 2 Tektronix Color Printers
 3 Cisco Routers
• 7507 Enterprise router
 3 Sunscreen firewalls
 2 PrivateNet firewalls
 1 Firewall-1 firewall
 2 Pentium laptops
Assorted other dedicated
hardware & software
MS
I
5
On-Going Projects–Brief Synopses
 Intrusion Detection
• AAFID agent-based system
• Characterizing Misuse
 Audit Analysis
• Audit content
• Audit representation & compression
 Firewalls and Network Protection
• Firewall evaluation lab
• Firewall structure
 Vulnerability Testing
MS
I
6
On-Going Projects (1)
 Vulnerability Database
• Data Mining
• Taxonomical Work
• Software Testing
 Archive Development
• Organization and Protection
• Archival document entry
 Secure outsourcing
 Watermarking
MS
I
7
On-Going Projects (2)
 ATM Security
 Network vulnerability analysis
 Database & Multimedia security
 Use of information-based terrorism
 Attack traceback analysis
 Privacy ethics & protections
 Best practices survey
MS
I
8
Current Sponsors
 Founding Sponsors
• Lilly Endowment
 Tier I Sponsors
• Andersen Consulting
• AT&T Labs/GeoPlex
• Cisco Systems
• GE Laboratories
• Global Integrity Corp.
• Hewlett-Packard Corp.
• Intel Corporation
• Microsoft
• MITRE
• Schlumberger
• Sun Microsystems
• Trident Data Systems
• Tripwire Security Systems
• TRW
 Tier II Sponsors
• Axent
 Other Donors
• Addison-Wesley
• INITA
• L3 Communications
• O’Reilly & Associates
• RiskWatch
• Tektronix
MS
I
9
Potential Sponsors
 Boeing
 Citicorp
 Compaq
 Department of Energy/LANL/Sandia
 Motorola
 NIST
 Swiss Bank Corporation
MS
I
10
Security QoS
 Security services
• E.g., audit, intrusion detection, …
 Many levels of service
• Multiple ``alarm levels’’ in an ID system
• Multiple levels of audit
 Costly in terms of network & storage
resources
• Low (high) security levels cause small (large)
footprints
• Impact on system usability/availability
– E.g., firewall blocks UDP packets
 Security requirements differ across the
network
MS
I
11
Research Issues in Security QoS
 How does user …
• … specify security QoS ?
• … negotiate security QoS ?
 What granularity (host ? subnet ? )
• Varies with security service considered
 Connections with DB QoS and network QoS
• Compete for same resources
• Benefit from same techniques
 … and many more in the following examples
• Intrusion detection
• Audit trail service
• Profiling service
• Secure multimedia document service
MS
I
12
Intrusion Detection Service (1)
 Experimental testbed: Existing AAFID
prototype
 Already supports multiple levels of
security
MS
I
13
Intrusion Detection Service (2)
 More research questions
• How to handle levels of security that vary across a
network
• The interface between security-level regions
– Where ``low’’ meets ``high’’
• What network QoS requirements should the
AAFID agents make ?
– Different types of agents
• What network QoS requirements should AAFID
monitors make ?
• What DB QoS requirements should the AAFID
entities make on the audit trail DB ?
MS
I
14
QoS Tradeoffs
 Footprint on network vs. level of security
• Economic model
• Cost-benefit analyses
• Characterize ``best’’ operating points
 Similar tradeoff for which security
services to provide
• Same research issues as above
 Functionality vs. security
MS
I
15
Audit Service
 Gives ability to know ``what happened’’
 Various levels of audit
• From ``Store all events’’ to ``store nothing’’
• Quality of audit required affects resources, hence system
usability and availability
 Requirements can vary
• From application to application
• From host to host
• From subnet to subnet
 DB techniques for audit data
• Audit data is massive (compression issues)
• Special nature of data and how it is used (``ephemeral
records’’)
• Special queries (searching for attack patterns)
MS
I
16
User Profiling Service
 Profile of user
• For active email (IBM Almaden), active DB
• For statistical ID (IDES, NIDES and related systems)
 Levels of quality (of profile)
• Extensive and accurate implies a higher expense
 Quality requirements are highly variable
• E.g., active DB can do with lower quality profile than MD
system
 Profiling technology
• Similar to statistical approach to intrusion detection
– Notion of ``normal’’ user (or network, or DB) behavior
– Difficult! (Curse of dimensionality, dependence, …)
• User profile is itself stored in special DB
– How fast should profile evolve? (Drawbacks to both extremes)
MS
I
17
Other Security Services
 Scanning
• Related to ID but intense & limited in time (ID is
continuous)
 Multimedia document services
• Timestamping, tamper-resistance, watermarking,
…
 Cryptographic protocol support
 PKI
 … etc
 Each service has its own QoS requirements/tradeoffs
MS
I
18
Other Contributions
 CERIAS Outreach
• Technology transfer to sponsors
• Workshops and Conferences
• Continuing Ed offerings
 CERIAS K-12
• Full-time coordinator
• Working with State Education Dept.
 CERIAS Archive Delivery
• Full-time Webmaster
• Major archive & dissemination

More Related Content

Similar to Purdue CERIAS Research in Information Security and QoS

CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewAlert Logic
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systemsAlan Tatourian
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3ShivamSharma909
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course contentShivamSharma909
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Pathshibaehed
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Offensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agendaOffensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agendaShivamSharma909
 
Offensive cyber security engineer
Offensive cyber security engineerOffensive cyber security engineer
Offensive cyber security engineerShivamSharma909
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updatedInfosecTrain
 
Science DMZ security
Science DMZ securityScience DMZ security
Science DMZ securityJisc
 
Protecting Against Web Attacks
Protecting Against Web AttacksProtecting Against Web Attacks
Protecting Against Web AttacksAlert Logic
 
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...BAINIDA
 
Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingShantanu Sharma
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5FRSecure
 
Thick Client Penetration Testing.pdf
Thick Client Penetration Testing.pdfThick Client Penetration Testing.pdf
Thick Client Penetration Testing.pdfSouvikRoy114738
 
Protecting Against Web App Attacks
Protecting Against Web App AttacksProtecting Against Web App Attacks
Protecting Against Web App AttacksAlert Logic
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxTrongMinhHoang1
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsReal-Time Innovations (RTI)
 

Similar to Purdue CERIAS Research in Information Security and QoS (20)

CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systems
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Offensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agendaOffensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agenda
 
Offensive cyber security engineer
Offensive cyber security engineerOffensive cyber security engineer
Offensive cyber security engineer
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updated
 
Science DMZ security
Science DMZ securityScience DMZ security
Science DMZ security
 
Protecting Against Web Attacks
Protecting Against Web AttacksProtecting Against Web Attacks
Protecting Against Web Attacks
 
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
 
Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data Processing
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5
 
Thick Client Penetration Testing.pdf
Thick Client Penetration Testing.pdfThick Client Penetration Testing.pdf
Thick Client Penetration Testing.pdf
 
Protecting Against Web App Attacks
Protecting Against Web App AttacksProtecting Against Web App Attacks
Protecting Against Web App Attacks
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Recently uploaded (20)

Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Purdue CERIAS Research in Information Security and QoS

  • 1. MS I Information Assurance and Security Eugene Spafford Professor Department of Computer Sciences Purdue University
  • 2. MS I 2 Outline  Security at Purdue, COAST/CERIAS  Resources, Sponsors  Ongoing Research Projects  Proposed QoS Research
  • 3. MS I 3 Information Security At Purdue  Information Security started in 1979  Many courses offered (grad, undergrad)  COAST (1992-97)  CERIAS (1998) • University-wide • Multidisciplinary
  • 4. MS I 4 Center Resources  32 Sun Workstations  2 Sun Enterprise Servers  9 MacOS Platforms  FORE ATM cloud • 40 host adapters • 2 BX200 • 4 FORErunners  3 486/586 PCs w/Win 95  4 Pentium Pro BSDI/Linux  12 Pentium II WinNT  5 HP Printers  2 Tektronix Color Printers  3 Cisco Routers • 7507 Enterprise router  3 Sunscreen firewalls  2 PrivateNet firewalls  1 Firewall-1 firewall  2 Pentium laptops Assorted other dedicated hardware & software
  • 5. MS I 5 On-Going Projects–Brief Synopses  Intrusion Detection • AAFID agent-based system • Characterizing Misuse  Audit Analysis • Audit content • Audit representation & compression  Firewalls and Network Protection • Firewall evaluation lab • Firewall structure  Vulnerability Testing
  • 6. MS I 6 On-Going Projects (1)  Vulnerability Database • Data Mining • Taxonomical Work • Software Testing  Archive Development • Organization and Protection • Archival document entry  Secure outsourcing  Watermarking
  • 7. MS I 7 On-Going Projects (2)  ATM Security  Network vulnerability analysis  Database & Multimedia security  Use of information-based terrorism  Attack traceback analysis  Privacy ethics & protections  Best practices survey
  • 8. MS I 8 Current Sponsors  Founding Sponsors • Lilly Endowment  Tier I Sponsors • Andersen Consulting • AT&T Labs/GeoPlex • Cisco Systems • GE Laboratories • Global Integrity Corp. • Hewlett-Packard Corp. • Intel Corporation • Microsoft • MITRE • Schlumberger • Sun Microsystems • Trident Data Systems • Tripwire Security Systems • TRW  Tier II Sponsors • Axent  Other Donors • Addison-Wesley • INITA • L3 Communications • O’Reilly & Associates • RiskWatch • Tektronix
  • 9. MS I 9 Potential Sponsors  Boeing  Citicorp  Compaq  Department of Energy/LANL/Sandia  Motorola  NIST  Swiss Bank Corporation
  • 10. MS I 10 Security QoS  Security services • E.g., audit, intrusion detection, …  Many levels of service • Multiple ``alarm levels’’ in an ID system • Multiple levels of audit  Costly in terms of network & storage resources • Low (high) security levels cause small (large) footprints • Impact on system usability/availability – E.g., firewall blocks UDP packets  Security requirements differ across the network
  • 11. MS I 11 Research Issues in Security QoS  How does user … • … specify security QoS ? • … negotiate security QoS ?  What granularity (host ? subnet ? ) • Varies with security service considered  Connections with DB QoS and network QoS • Compete for same resources • Benefit from same techniques  … and many more in the following examples • Intrusion detection • Audit trail service • Profiling service • Secure multimedia document service
  • 12. MS I 12 Intrusion Detection Service (1)  Experimental testbed: Existing AAFID prototype  Already supports multiple levels of security
  • 13. MS I 13 Intrusion Detection Service (2)  More research questions • How to handle levels of security that vary across a network • The interface between security-level regions – Where ``low’’ meets ``high’’ • What network QoS requirements should the AAFID agents make ? – Different types of agents • What network QoS requirements should AAFID monitors make ? • What DB QoS requirements should the AAFID entities make on the audit trail DB ?
  • 14. MS I 14 QoS Tradeoffs  Footprint on network vs. level of security • Economic model • Cost-benefit analyses • Characterize ``best’’ operating points  Similar tradeoff for which security services to provide • Same research issues as above  Functionality vs. security
  • 15. MS I 15 Audit Service  Gives ability to know ``what happened’’  Various levels of audit • From ``Store all events’’ to ``store nothing’’ • Quality of audit required affects resources, hence system usability and availability  Requirements can vary • From application to application • From host to host • From subnet to subnet  DB techniques for audit data • Audit data is massive (compression issues) • Special nature of data and how it is used (``ephemeral records’’) • Special queries (searching for attack patterns)
  • 16. MS I 16 User Profiling Service  Profile of user • For active email (IBM Almaden), active DB • For statistical ID (IDES, NIDES and related systems)  Levels of quality (of profile) • Extensive and accurate implies a higher expense  Quality requirements are highly variable • E.g., active DB can do with lower quality profile than MD system  Profiling technology • Similar to statistical approach to intrusion detection – Notion of ``normal’’ user (or network, or DB) behavior – Difficult! (Curse of dimensionality, dependence, …) • User profile is itself stored in special DB – How fast should profile evolve? (Drawbacks to both extremes)
  • 17. MS I 17 Other Security Services  Scanning • Related to ID but intense & limited in time (ID is continuous)  Multimedia document services • Timestamping, tamper-resistance, watermarking, …  Cryptographic protocol support  PKI  … etc  Each service has its own QoS requirements/tradeoffs
  • 18. MS I 18 Other Contributions  CERIAS Outreach • Technology transfer to sponsors • Workshops and Conferences • Continuing Ed offerings  CERIAS K-12 • Full-time coordinator • Working with State Education Dept.  CERIAS Archive Delivery • Full-time Webmaster • Major archive & dissemination

Editor's Notes

  1. May 5, 1999
  2. May 5, 1999
  3. May 5, 1999
  4. May 5, 1999
  5. May 5, 1999
  6. May 5, 1999
  7. May 5, 1999