1 / 12

Advanced Network Security

Advanced Network Security. Fall 2014 Instructor: Kun Sun, Ph.D. Why CSCI 780?. For credits Ph.D. requirement Information security is important System security Network security. Our Goal. Latest security research activities Reading technical papers in recent years

lark
Télécharger la présentation

Advanced Network Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Advanced Network Security Fall 2014 Instructor: Kun Sun, Ph.D.

  2. Why CSCI 780? • For credits • Ph.D. requirement • Information security is important • System security • Network security

  3. Our Goal • Latest security research activities • Reading technical papers in recent years • How to do research in security area • How to read research paper? • How to write research paper? • How to write a paper review? • How to present your research work?

  4. What is CSCI 780? • This is a graduate level course • Reading papers • Two class presentations • Teach us • Two paper review reports • Insightful comments • Other than the presented papers, 2-3 pages • One term project • By yourself • 5 extra point if presented in the class, FCFS • Grading Policy • 10% class attendance • 20% Paper reviews • 30% Class presentation • 40% Term project

  5. Paper Reviews • Summarize the main idea of the paper • Problem they solved • Approach they took: novelty • How did they evaluate • Pros and Cons • Any ways to improve the work?

  6. Term Project • Proposal (Due on Oct. 1) • Problem statement • Progress report (Optional) • Preliminary results • Final report (Due on Dec. 3) • Complete project report

  7. Project Proposal • PDF, 2-3 pages, single space, 10 font size • Potential format: • Problem Statement • Motivation • Objectives • Related works • Technical approach

  8. Final Project Report • 10-20 pages, single space, 10 font size • Conform to formats of research papers • May contain the following sections: • Abstract • Introduction • Related work • System Architecture/System design/Technical Approach • Implementation and experimental results • Discussion (e.g., limitations) • Conclusion and future works

  9. Paper Reviews • Summarize the main idea of the paper • Problem they solved • Approach they took: novelty • How did they evaluate • Pros and Cons • Any ways to improve the work?

  10. Required Skills • System programming • Network simulation • Kernel hacking • Data collection and processing • Analytical skills • Probability and statistics • Queueing theory • Mathematical modeling

  11. Useful resources • Security conferences • First tier: ACM CCS, IEEE S&P, Usenix Security, NDSS; Crypto, Eurocrypt • Second tier: DSN, ESORICS, RAID, ACSAC, IMC, etc. • Third tier: SecureComm, CODASPY, DIMVA, ACNS, WiSec, etc. • System conferences • SOSP , OSDI , Usenix ATC, NSDI, ASPLOS, etc. • Journals • ACM Transactions on Information and System Security (TISSEC) • IEEE Transactions on Dependable and Secure Computing (TDSC)

  12. Honor Code Violations • A. Lying: the presentation of false information with the intent to deceive.  • B. Stealing: knowingly taking or appropriating the property of another, including property of the College, without the rightful owner’s permission and with the intent to permanently or substantially deprive the owner of the property. • Cheating: including, but not limited to, Plagiarism, Unauthorized Assistance/Collaboration, Use of Unauthorized materials, Unauthorized Dual Submission of Previous Academic Work, Time Constraint Violation, Directions Violation,

More Related