advanced network security

12
Advanced Network Security Fall 2014 Instructor: Kun Sun, Ph.D.

Upload: lark

Post on 04-Jan-2016

46 views

Category:

Documents


1 download

DESCRIPTION

Advanced Network Security. Fall 2014 Instructor: Kun Sun, Ph.D. Why CSCI 780?. For credits Ph.D. requirement Information security is important System security Network security. Our Goal. Latest security research activities Reading technical papers in recent years - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Advanced Network Security

Advanced Network Security

Fall 2014Instructor: Kun Sun, Ph.D.

Page 2: Advanced Network Security

2

Why CSCI 780? For credits Ph.D. requirement

Information security is important System security Network security

Page 3: Advanced Network Security

3

Our Goal Latest security research activities

Reading technical papers in recent years

How to do research in security area How to read research paper? How to write research paper? How to write a paper review? How to present your research work?

Page 4: Advanced Network Security

4

What is CSCI 780? This is a graduate level

course Reading papers

Two class presentations Teach us

Two paper review reports Insightful comments Other than the presented

papers, 2-3 pages One term project

By yourself 5 extra point if presented

in the class, FCFS

Grading Policy 10% class

attendance 20% Paper reviews 30% Class

presentation 40% Term project

Page 5: Advanced Network Security

5

Paper Reviews Summarize the main idea of the

paper Problem they solved Approach they took: novelty How did they evaluate

Pros and Cons Any ways to improve the work?

Page 6: Advanced Network Security

6

Term Project Proposal (Due on Oct. 1)

Problem statement Progress report (Optional)

Preliminary results Final report (Due on Dec. 3)

Complete project report

Page 7: Advanced Network Security

Project Proposal

PDF, 2-3 pages, single space, 10 font size

Potential format: Problem Statement

Motivation Objectives

Related works Technical approach

Page 8: Advanced Network Security

Final Project Report

10-20 pages, single space, 10 font size

Conform to formats of research papers

May contain the following sections: Abstract Introduction Related work System Architecture/System

design/Technical Approach Implementation and experimental

results Discussion (e.g., limitations) Conclusion and future works

Page 9: Advanced Network Security

9

Paper Reviews Summarize the main idea of the

paper Problem they solved Approach they took: novelty How did they evaluate

Pros and Cons Any ways to improve the work?

Page 10: Advanced Network Security

10

Required Skills System programming

Network simulation Kernel hacking Data collection and processing

Analytical skills Probability and statistics Queueing theory Mathematical modeling

Page 11: Advanced Network Security

11

Useful resources Security conferences

First tier: ACM CCS, IEEE S&P, Usenix Security, NDSS; Crypto, Eurocrypt

Second tier: DSN, ESORICS, RAID, ACSAC, IMC, etc. Third tier: SecureComm, CODASPY, DIMVA, ACNS,

WiSec, etc. System conferences

SOSP , OSDI , Usenix ATC, NSDI, ASPLOS, etc. Journals

ACM Transactions on Information and System Security (TISSEC)

IEEE Transactions on Dependable and Secure Computing (TDSC)

Page 12: Advanced Network Security

12

Honor Code Violations A. Lying: the presentation of false information

with the intent to deceive.  B. Stealing: knowingly taking or appropriating

the property of another, including property of the College, without the rightful owner’s permission and with the intent to permanently or substantially deprive the owner of the property.

Cheating: including, but not limited to, Plagiarism, Unauthorized Assistance/Collaboration, Use of Unauthorized materials, Unauthorized Dual Submission of Previous Academic Work, Time Constraint Violation, Directions Violation,