Data and Applications Security - The University of Texas at Dallas
Download
Report
Transcript Data and Applications Security - The University of Texas at Dallas
Data and Applications Security
Research at the
University of Texas at Dallas
Dr. Bhavani Thuraisingham
The University of Texas at Dallas
April 25, 2006
Cyber Security
Research Areas at UTD
Network Security
Secure wireless and sensor networks
Systems and Language Security
Embedded systems security, Buffer overflow defense
Data and Applications Security
Information sharing, Geospatial data management, Surveillance,
Secure web services, Privacy, Dependable information management,
Intrusion detection
Security Theory and Protocols
Secure group communication
Security Engineering
Secure component-based software
Cross Cutting Themes
Vulnerability analysis, Access control
Research Group:
Data and Applications Security
Core Group
- Prof. Bhavai Thuraisingham (Professor & Director, Cyber
Security Research Center)
- Prof. Latifur Khan (Director, Data Mining Laboratory)
- Prof. Murat Kantarcioglu (Joined Fall 2005, PhD. Purdue U.)
- Prof. Kevin Hamlen (will join Fall 2006 from Cornell U.)
Students and Funding
- 10 PhD Students, 16 MS students
- Research grants (Since 2005) Air Force Office of Scientific
Research Center, Raytheon Corporation, Nokia Corporation and
proposals submitted to NSF, DHS, etc.
- Our Vision:
Assured Information Sharing, Secure Geospatial data
management, Video Surveillance
Vision 1: Assured Information Sharing
Data/Policy for Coalition
Publish
Data/Policy
Publish
Data/Policy
Publish
Data/Policy
Component
Data/Policy for
Agency A
Component
Data/Policy for
Agency C
Component
Data/Policy for
Agency B
1.
Friendly partners
2.
Semi-honest partners
3.
Untrustworthy partners
Vision 2: Secure Geospatial Data Management
Data Source A
Data Source B
Data Source C
Semantic Metadata
Extraction
Decision Centric Fusion
Geospatial data
interoperability through
web services
Geospatial data mining
Geospatial semantic web
Tools for
Analysts
SECURITY/ QUALITY
Discussions on collaborative research between UTD, OGC (Open Geospatial Consortium),
Oracle and Raytheon
Vision 3: Surveillance and Privacy
Raw video surveillance data
Face Detection and
Face
Derecognizing
system
Faces of trusted people
derecognized to
preserve privacy
Suspicious Event
Detection System
Manual Inspection
of video data
Suspicious people
found
Suspicious events
found
Report of security personnel
Comprehensive
security report
listing suspicious
events and people
detected
Example Projects
Assured Information Sharing
-
Secure Semantic Web Technologies
Social Networks
Privacy Preserving Data Mining
Geospatial Data Management
-
Geospatial data mining
Geospatial data security
Surveillance
-
Suspicious Event Detention
Privacy preserving Surveillance
Automatic Face Detection
Cross Cutting Themes
-
Data Mining for Security Applications (e.g., Intrusion detection, Mining
Arabic Documents); Dependable Information Management
Secure Semantic Web
Technology
At UTD
Interface to the Semantic Web
Inference Engine/
Rules Processor
Policies
Ontologies
Rules
Semantic Web
Engine
XML, RDF
Documents
Web Pages,
Databases
Social Networks
Individuals engaged in suspicious or undesirable behavior rarely
act alone
We can infer than those associated with a person positively
identified as suspicious have a high probability of being either:
Accomplices (participants in suspicious activity)
Witnesses (observers of suspicious activity)
Making these assumptions, we create a context of association
between users of a communication network
-
Privacy Preserving Data Mining
Prevent useful results from mining
- Introduce “cover stories” to give “false” results
- Only make a sample of data available so that an adversary is
unable to come up with useful rules and predictive functions
Randomization and Perturbation
- Introduce random values into the data and/or results
- Challenge is to introduce random values without significantly
affecting the data mining results
- Give range of values for results instead of exact values
Secure Multi-party Computation
- Each party knows its own inputs; encryption techniques used to
compute final results
Geospatial Data Mining:
Change Detection
Trained Neural Network to predict “new” pixel from “old” pixel
- Neural Networks good for multidimensional continuous data
- Multiple nets gives range of “expected values”
Identified pixels where actual value substantially outside range
of expected values
Anomaly if three or more bands (of seven) out of range
Identified groups of anomalous pixels
-
Framework for Geospatial Data Security
DATA PRESENTATION COMPONENTS
Open
Geospatial
Consortium
Framework
Traditional GIS
GIS Web Services
Wrapper
SECURITY LAYER
Core &
Application
Schemas
Geospatial
Features
Geography
Markup
Language
Authentic
Data Publication
DAC/RBAC Policy
Specification
Policy Reasoning
Engine
Access Control
Module
Trust & Privacy
Management
Auditing
Misuse Detection
Metadata
DATA ACCESS LAYER
Geospatial Data Registration
spatial and temporal
registration of geospatial data
Geospatial
Data
Repositories
Data Integration Services
&
Data Repository Access
Data Mining for Surveillance
We define an event representation measure based on low-level
features
This allows us to define “normal” and “suspicious” behavior and
classify events in unlabeled video sequences appropriately
A visualization tool can then be used to enable more efficient
browsing of video data
Data Mining for Intrusion Detection
Training
Data
Classification
Hierarchical
Clustering (DGSOT)
SVM Class Training
Testing
DGSOT: Dynamically growing self organizing tree
SVM: Support Vector Machine
Testing Data
Information
Assurance Education
Current Courses
Introduction to Information Security: Prof. Sha
Trustworthy Computing: Prof. Sha
Cryptography: Prof. Sudburough
Information Assurance: Prof. Yen
Data and Applications Security: Prof. Thuraisingham
Biometrics: Prof. Thuraisingham
Privacy: Prof. Murat Kantarcioglu
Future Courses
Network Security: Profs. Ventatesan, Sarac
Security Engineering: Profs. Bastani, Cooper
Digital Forensics: Prof. Venkatesan
Intrusion Detection: Prof. Khan
Digital Watermarking: Prof. Prabhakaran
Technical and Professional
Accomplishments
Publications of research in top journals and conferences, books
IEEE Transactions on Knowledge and Data Engineering, IEEE Transaction on
Software Engineering, IEEE Computer,
IEEE Transactions on Systems, Man and Cybernetics, IEEE Transactions on
Parallel and Distributed Systems, VLDB Journal, 7 books published and 2 books
in preparation including one on UTD research (Data Mining Applications, Awad,
Khan and Thuraisingham)
Member of Editorial Boards/Editor in Chief
Journal of Computer Security, ACM Transactions on Information and Systems
Security, IEEE Transactions on Dependable and Secure Computing, IEEE
Transactions on Knowledge Engineering, Computer Standards and Interfaces - - -
Advisory Boards / Memberships
Purdue University CS Department, - - -
Awards and Fellowships
IEEE Fellow, AAAS Fellow, BCS Fellow, IEEE Technical Achievement Award,
IEEE Senior Member, - - -