20
Research Interest overview and future directions Mina Guirguis Computer Science Department Texas State University – San Marcos CS5300 9/16/2011

Research Interest overview and future directions

  • Upload
    ciqala

  • View
    32

  • Download
    0

Embed Size (px)

DESCRIPTION

Research Interest overview and future directions. Mina Guirguis Computer Science Department Texas State University – San Marcos CS5300 9/16/2011. Research areas. Mobile Cyber-Physical Systems Security in networks and systems Digital Forensics Networks. Mobile Cyber-Physical System. - PowerPoint PPT Presentation

Citation preview

Page 1: Research Interest overview and future directions

Research Interest overview and future directions

Mina Guirguis

Computer Science Department

Texas State University – San Marcos

CS5300

9/16/2011

Page 2: Research Interest overview and future directions

Research areas

Mobile Cyber-Physical Systems Security in networks and systems Digital Forensics Networks

Page 3: Research Interest overview and future directions

Mobile Cyber-Physical System

Cyber-Physical System (CPS) Combine computation and communication with our

physical world Intelligent buildings Robotics surgery Control systems

Mobile CPSs Subclass of CPSs where physical systems are mobile Cell phones, robots, cars, etc…

Page 4: Research Interest overview and future directions

Motivating example

First feature video from the iRobot In military applications

Page 5: Research Interest overview and future directions

Other motivating examples

Page 6: Research Interest overview and future directions

Research vision and goal

Vision: environment in which mobile nodes collaborate to solve problems Robots communicate to achieve a specific task Cell phones share resources (CPU, network, power) Cars coordinate to realize an intelligent transportation

system

Goal: ensure that Mobile CPS applications are safe and secure

Page 7: Research Interest overview and future directions

Challenges

Mobile CPSs will rely on wireless communication Attackers can interfere with/jam the signal between mobile

nodes, preventing them from communicating

Mobile CPSs are emerging as complex systems Complex systems are easier to attack and harder to debug

Mobile CPSs will make decisions under failures Control theory address noise due to random failure Attacks are not random failures, but well orchestrated

Page 8: Research Interest overview and future directions

General research approach

Play the role: offense Identifying optimal and suboptimal attack policies What is the worst adversarial signal that would cripple

the system at this point in time? How can an attacker evade detection?

Play the role: defense Randomization: make the system less predictable Attacker would not be able to mount potent attacks

Page 9: Research Interest overview and future directions

Mobile CPS Lab

4 iRobot Create, each with a netbook on top Camera, wireless, sensors

2 SRV-1 Blackfin robots Open source Camera, wireless, sensors

Servers and laptops for simulation and numerical analysis

Page 10: Research Interest overview and future directions

Research areas

Mobile Cyber-Physical Systems Security in networks and systems Digital Forensics Networks

Page 11: Research Interest overview and future directions

Network and systems security

Second feature video from a movie “Untraceable” the movie 2008

Page 12: Research Interest overview and future directions

Research agenda

Goal: ensure secure and resilient networking and system components

Denial of Service (DoS) attacks Uninteresting -- easy to trace back to the heavy hitters

More interesting: Identify stealthy attacks Do not take a lot of resources to mount Undetectable Untraceable

Page 13: Research Interest overview and future directions

Stealthy attacks

Idea: to exploit “adaptation mechanisms” found in networks and computing systems Adapting content based on load Adapting traffic rates based on congestion Balancing traffic across servers Reorganizing a P2P network

Analogy: Make other drivers brake when they should accelerate and accelerate when they should brake

Page 14: Research Interest overview and future directions

Illustrative example…

DoS attacks (exploiting capacity)

Low-rate attacks (exploiting adaptation)

Page 15: Research Interest overview and future directions

Exploiting adaptation

Adaptation mechanisms are designed under the assumption of non-adversarial loads Examples: random traffic patterns, random arrival

processes, etc.)

What types (patterns) of load would make adaptation harmful?

What are the tradeoffs between efficiency and tolerance to dynamic exploits?

Page 16: Research Interest overview and future directions

Research areas

Mobile Cyber-Physical Systems Security in networks and systems Digital Forensics Networks

Page 17: Research Interest overview and future directions

Digital forensics

Vision: Build effective tools to recover, examine and preserve digital evidence

Examples of digital evidence: Financial fraud documents Threatening/blackmail emails Contraband material Viruses, worms, trojans, backdoors, spyware, etc… Incriminating network connections Steganography channels for espionage

Page 18: Research Interest overview and future directions

Digital forensics

Goal: Help investigators extract evidence from a computer or a digital device (iPad, iPhone, mp3 player) Done very carefully to be admissible in court Offline versus Online (live response) Speed up the process of finding evidence

Requires knowledge that spans different areas: Networks, systems, security, statistics, image processing,

criminal law, etc…

Page 19: Research Interest overview and future directions

Research areas

Mobile Cyber-Physical Systems Security in networks and systems Digital Forensics Networks

Page 20: Research Interest overview and future directions

Final remarks

My email address: [email protected]

Office hours: Mondays: 4:30 – 6:00 (in Round Rock) Tuesdays: 3:30 - 5:00 (in San Marcos) Thursdays: 10:00 – 12:00 (in San Marcos)