Document 7276352

Download Report

Transcript Document 7276352

CDA6938 Special Topic:
Research in Computer and
Network Security (spring’07)
Class Overview
1

Tuesday/Thursday 4:30pm – 5:45pm

Office Hour: 2:30pm – 4:30pm

Eng3-335, [email protected], 407-823-5015

Class webpage:

http://www.cs.ucf.edu/~czou/CDA6938
2
Why Am I Teaching This Course?

Computer and Network Security is important




A broad research/application issue
Impact on many important applications
Become more important as we rely heavily on computer
and the Internet
Helpful to your study and future career:


If you plan to conduct security research related work
If you plan to conduct any research-related work


Help you to learn basic steps in conducting research
How to: Read paper? Find hole in paper? Find topic to do?
Make presentation? Conduct collaborated research?
3
A “Seminar” Course

Focus on cybersecurity-related research

Study research papers, publications

Students must have active roles:
 Present papers in class
 Be active in class discussion, ask questions!


Not an introductory class on computer security



Count in your grade!
No lab experiments
No introduction on security appliance or cryptography
However, you are not required to have much knowledge of
computer security beforehand
4
Prerequisite

You must have knowledge of computer
networking!


TCP/IP, packet, Internet (addr., DNS, routing…)
Basic knowledge on:
Probability (most research work uses this!)
 Software (stack, system call…)
 Operating system

5
Class Grading Policy

Class presentations:
20%

Homework (paper review/summary):
10%

In-class participation/discussion:
20%

Final term project:
50%


Two students as a group
Will use +/- grading system
6
Topics Covered in Class

Focus mainly on wired Internet security




Internet worm, Internet security measurement
Honeypot, Spam, Denial-of-Service, Intrusion Detection
Network attack techniques
Host-based computer security


Will also cover:

Wireless security



Software security, OS security
Sensor network security issues
Wireless LAN security
More papers to be added in the following two
weeks
7
Term Project

Two students form a group to do term
project together
A research oriented term project
 Project report follows the same format as a paper
for publish
 Learn how to conduct research and write paper


Form the group and decide the title 6-8
weeks later
8
Example of Term Project

Simple:



Middle:


Survey of the state-of-art research work in a topic
Repeat and realize algorithm/experiments in a
published paper
Minor improvement of algorithms in published papers
Advanced:

Present a novel idea with support from simulation or
real experiments


E.g., success in using an idea from another area to a new topic in
computer security
Has potential to be developed as a published paper
9
What I know and Do not know

I know most research in Internet security


Especially on Internet worm, botnet, modeling
I have some knowledge in:
Intrusion detection, software security
 Wireless security


Hence the course will evolve as we go on

I will also learn from this course
10
Class Format



Papers are grouped according to topics
As we move to a new topic, usually I will present a
brief introduction
In each class, two students present two papers



Presentation: 25 min
Discussion: 10 min
My summary: 5 min (at the end if time allows)


Point out what you do right, wrong
Help you improve your paper reading, presentation skill
11
Next

I will give two presentations in this week



Objective:




“Internet malware modeling and defense”
“Modeling and Measuring Botnet”
Give you an example on paper presentation
Show how to ask questions in reading a paper
Show how to find points to do further research by
yourself
Come ready to ask questions and discuss

Remember, class discussion counts 20% of grade!
12