DFW-Metroplex - The University of Texas at Dallas

Download Report

Transcript DFW-Metroplex - The University of Texas at Dallas

Economic Development for
the DFW Metroplex
Related to Security:
An Academic Perspective
Dr. Bhavani Thuraisingham
The University of Texas at Dallas
December 2006
4/1/2016 02:51
2
Contact Information
0 Dr. Bhavani Thuraisingham
Professor of Computer Science and
Director of Cyber Security Research Center
The University of Texas at Dallas
Richardson, TX 75083
Phone: 972-883-4738
Fax: 972-883-2349
[email protected]
www.utdallas.edu/~bxt043000/
4/1/2016 02:51
3
Areas for Economic Development
related to Security
0 Border Security
- Technologies for protecting the borders will have an
impact on the economy
0 Education
- Build an educated workforce
0 Inland Port
- Technologies for Inland Port to promote trade with China
and other countries
0 Why we should not outsource data yet
- Serious security and privacy concerns
4/1/2016 02:51
4
Border Security
0 We need to monitor the borders and ports to prevent and
detect terrorism
0 Our research is focusing on the following topics for national
security
- Surveillance for suspicious events
- Data mining for Counter-terrorism
- RFID data management
- Cannot forget about PRIVACY
4/1/2016 02:51
Video Surveillance and
Suspicious Event Detection
0 Huge amounts of video data
available in the security domain
0 Need for tools to aid human analyst;
pointing out areas in video where
unusual activity occurs;
0
We have developed a system to
detect suspicious events
0 Biometrics for Face detection
0 Investigating Privacy Preserving
Surveillance
5
4/1/2016 02:51
6
What is Data Mining?
Data Mining
Information Harvesting
Knowledge Mining
Knowledge Discovery
in Databases
Data Pattern Processing
Database Mining
Data Dredging
Data Archaeology
Siftware
Knowledge Extraction
The process of discovering meaningful new correlations, patterns, and
trends by sifting through large amounts of data, often previously
unknown, using pattern recognition technologies and statistical and
mathematical techniques
(Data Mining: Technologies, Techniques, Tools and Trends, CRC Press, 1998
Author: Bhavani Thuraisingham)
4/1/2016 02:51
7
Data Mining for Counterterrorism:
Non-real-time Analysis
0 Gather data from multiple sources
- Information on terrorist attacks: who, what, where, when, how
- Personal and business data: place of birth, ethnic origin,
religion, education, work history, finances, criminal record,
relatives, friends and associates, travel history, . . .
- Unstructured data: newspaper articles, video clips, speeches,
emails, phone records, . . .
0 Integrate the data, build warehouses and federations
0 Develop profiles of terrorists, activities/threats
0 Mine the data to extract patterns of potential terrorists and predict
future activities and targets
0 Find the “needle in the haystack” - suspicious needles?
0 Need to maintain PRIVACY
- Privacy Preserving Data Mining
4/1/2016 02:51
8
RFID Data Management
0 RFID: Radio Frequency Identifier
0 We are developing a data management system to manage the
RFID data streams emanating from the tags
0 Query processing in data streams
0 Security and privacy techniques to ensure authorized access
and privacy of individuals
0 Digital identity management
4/1/2016 02:51
9
Security Education at the University of Texas at
Dallas (UTD)
0 We are NSA/DHS Center for Excellence on Information
0
0
0
0
0
Assurance Education
Focus areas include: System security, Data and Applications
security, Network security, Secure geospatial data
management
Strong team also focusing on data mining for national
security as well as cyber security
Also developing system for Emergency Preparedness
Research for NSF, Air Force, EPA, DFW Corporations, and
discussing plans with DHS
Strong collaboration with Industry through contracts and
student worker positions
4/1/2016 02:51
10
Technologies for Inland Port Creation
0 Data Mining and Knowledge Management technologies will
strengthen DFW position in becoming the major city in USA for trade
0 DFW is the 8th largest city in US, has one of the nation’s largest hub
airport in the heart of the country with easy access to almost every
city in US and several countries
- We must get the nonstop route to/from Beijing
0 Data mining will help us to determine who our competitors are, what
are their strategies, what actions do we need to take?
0 Knowledge management technologies will improve e-business,
supply chain management, enterprise resource planning, enterprise
security, all critical for trade
0 UTD has strength in both data mining and knowledge management
technologies; we are also conducting research on supply chain
management and e-business
4/1/2016 02:51
11
Outsourcing Data
0 Daily we are hearing about job losses due to outsourcing
0 We need to be very careful when outsourcing our critical data
0
0
0
0
- Accounting data, Income tax data, etc.
Maintaining security and privacy for outsourced data is very
difficult at present
- We are conducting research on querying encrypted data
and practical solutions are yet to be developed; need lot
more research
Even if key attributes are suppressed, Inference Problem may
be possible
We don’t want our precious and valuable data to go into the
wrong hands
Tradeoffs between Outsourcing and Security
4/1/2016 02:51
12
In Summary
0 Continue with Border security activities with attention to
Privacy
0 Education is our strength; promote Math and Science in DFW;
encourage people from other states to migrate to DFW for our
education; close collaboration with Industry
0 Develop technologies to enable DFW become a major Indoor
port for USA and our Trade partners
0 Be careful about outsourcing our data and conduct research
on security solutions