The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

An Exploration of Highly Focused, Coprocessor-based Information System Protection

CERIAS TR 2007-66
Paul Williams and Eugene H. Spafford
Download: PDF

Most past and present intrusion detection systems architectures assume a uniprocessor environment or do not explicitly make use of multiple processors when they exist. Yet, especially in the server world, multiple processor machines are commonplace; and with the advent of technologies such as Intel and ANID’s multi-core or Hyperthreading technologies, commodity computers are likely to have multiple processors.

This research explores how explicitly dividing the system into production and security components and running the components in parallel on different processors can improve the effectiveness of the security system. The production component contains all user tasks and most of the operating system while the security component contains security monitoring and validating tasks and the parts of the O/S that pertain to security. We demonstrate that under some circumstances this architecture allows intrusion detection systems to use monitoring models with higher fidelity, particularly with regard to the timeliness of detection, and will also increase system robustness in the face of some types of attacks.

Empirical results with a prototype co-processing intrusion detection system (Cu-PIDS) architecture support the feasibility of this approach. The construction of the prototype allowed us to demonstrate the implementation costs of the architecture are reasonable. Experimentation using fine-grained protection of real-world applications resulted in about a fifteen percent slowdown white demonstrating CuPIDS’ ability to quickly detect and respond to illegitimate behavior.

Added 2007-09-19

Voter Assurance

CERIAS TR 2007-65
Eugene H. Spafford
Download: PDF

Voting with assurance seems to be an obvious, simple concept. A registered voter should be able to cast his or her ballot with the confidence that the vote will be counted as cast. Traditionally, paper ballots have seemed like a simple, comfortable voting solution. However, paper ballots in some forms can be easily manipulated, result in ambiguous interpretations (e.g., “hanging chads”), are sometimes error-prone, and do not provide a quick tally. In our technology-saturated society, we want results right away, and it would seem that technology could speed up vote counting and make it more accurate. Computers are being integrated into every aspect of our lives, so why can’t they work for voting, too? If we can use computers to control airplanes, factories, and ATM machines, we should certainly be able to use them in voting!

Added 2007-09-19

Happy Birthday, Dear Viruses

CERIAS TR 2007-64
Richard Ford and Eugene H. Spafford
Download: PDF

The first computer virus was created 25 years ago, but there is no end in sight to malicious software.

Added 2007-09-19

Matching and Fairness in Threat-based Mobile Sensor Coverage

CERIAS TR 2007-58
Chris Y. T. Ma, Jren-chit Chen, David K. Y. Yau, Nageswara S. Rao, Mallikarjun Shankar
Download: PDF

We propose a coverage algorithm for mobile sensors to achieve a coverage that will match - over the long term and as quantified by an RMSE metric - a given threat profile.

Added 2007-09-18

Systems Support for Radiational Plume Detection, Identification, and Tracking Sensor-cyber Networks

CERIAS TR 2006-56
David K. Y. Yau, Jennifer C. Hou, Shankar Mallikarjun
Download: PDF

The project aims to design, realize, evaluate, and deploy a detection, identification, and tracking sensor cyber network (DITSCN) for chemical and radiational plumes. The current focus is on building a system of radiation sensors inter-connected by wireless links for detecting the presence of radioactive materials, identifying the radiation source, and tracking their propagation over time.

Added 2007-09-18

Controversies in Science and Technology

CERIAS TR 2007-59
Eugene H. Spafford and Annie I. Anton
Added 2007-09-18

Information Assurance: Dependability and Security in Networked Systems

CERIAS TR 2007-57
Bingrui Foo, Matthew W. Glause, Gaspar M. Howard, Yu-Sung Wu, Saurabh Bagchi, Eugene H. Spafford
Download: PDF

Protecting networks from computer security attacks is an important concern of computer security. Within this, intrusion prevention and intrusion detection systems have been the subject of much study and have been covered in several excellent survey papers. However, the actions that need to follow the steps of prevention and detection, namely response, have received less attention from researchers or practitioners. It was traditionally thought of as an offline process,  with humans in the loop, such as system administrators performing forensics by going through the system logs and determining which services or components need to be recovered. Our systems today have reached a level of complexity and the attacks directed at them a level of sophistication that manual responses are no longer adequate. So far there has been limited work in autonomous intrusion response systems, especially work that provides rigorous analysis or generalizable system building techniques. The work that exists has not been surveyed previously.  In this survey paper, we lay out the design challenges in building autonomous intrusion response systems. Then we provide a classification of existing work on the topic into four categories

Added 2007-09-18

On Area of Interest Coverage in Surveillance Mobile Sensor Networks

CERIAS TR 2007-56
Yu Dong, Wing-Kai Hon, and David K. Y. Yau
Download: PDF

In this paper, we develop concepts of network coverage by a set of mobile sensors for given areas of interest, possibly under deadline constraints. our analytical results characterize the fundamental statistic properties of AOI coverage when sensors move according to an enhanced random waypoint model. Extensive experimental results are reported to verify and illustrate the analytical results.

Added 2007-09-17

A Sensor-cyber Network Testbed for Plume Detection, Identification, and Tracking

CERIAS TR 2007-55
Jren-Chit Chin, I-Hong Hou, Chris Ma, Mohit Saxena, Yong Yang
Download: PDF

Under the national SensorNet initiative, Oak Ridge National Lab, in conjunction with its University collaborators, has carried out the initial deployment of a detection, identification, and tracking sensor-cyber network (DITSCN) in the Washington D.C. and Memphis Port areas, against radiational, biological, and chemical attacks.

DITCS combines various modalities of sensors and cyber networks. -Sensors network provides the information about the physical space -Cyber network provides storage and computational resources to predict plume propagation based on realistic dispersion models -Decisions regarding future sensing and communications are made in cyber network and carried out in physical space.

Added 2007-09-17

Role Mining for Engineering and Optimizing Role Based Access Control Systems

CERIAS TR 2007-60
Ninghui Li, Tiancheng Li, Ian Mollog, Qihua Wang, Elisa Bertino, Seraphic Calo, Jorge Lobo
Download: PDF

Role engineering is the process of designing an RBAC system.  A promising approach to role engineering is role mining, which uses data mining techniques to find an RBAC system from existing permission assignment data.  Role mining techniques are also useful for optimizing and refactoring an existing RBAC system, which can become increasingly chaotic over time. In this paper we study the problem of mining an RBAC system that optimizes some objective measure of ``goodness’’ for RBAC systems. We introduce the weighted structural complexity measure, which sums up the sizes of different RBAC system components (e.g., the number of roles, the number of user-role assignments, etc.), possibly with different weights for each component. Different optimization objectives can be achieved by choosing different weight combinations.  We show that the optimization problem is NP-complete.  We then develop heuristic techniques for mining RBAC systems with low weighted structural complexity. We show that the problem of mining a hierarchical RBAC system is closely related to formal concept analysis, and develop an algorithm using the notion of a concept lattice. We also introduce new approaches to generating synthetic data for evaluating role mining techniques. Our experiments show that our algorithms outperform existing approaches.

Added 2007-09-14

Distance Reduction in Mobile Wireless Communication: Lower Bound Analysis and Practical Attainment

CERIAS TR 2007-49
Yu Dong, Wing-Kai Hon, David K. Y. Yau, and Jren-Chit Chin
Download: PDF

In this paper, we characterize the fundamental performance limit, namely the lower bound expected communication distance, achievable by any postponement algorithm within given deadline constraints. We consider a realistic map based stochastic movement model, of which the well known random waypoint model is a special case. For the random waypoint model, we develop a tight analytical lower bound that has a low computational complexity.

Added 2007-09-13

On Intelligent Mobile Target Detection in a Mobile Sensor Network

CERIAS TR 2007-52
Jren-Chit Chin, Yu Dong, Wing-Kai Hon, and David K. Y. Yau
Download: PDF

We study the problem of a mobile target (the mouse) trying to evade detection by one or more mobile sensors (we call such a sensor a cat) in a closed network area. We view our problem as a game between two players; the mouse, and the collection of cats forming a single (meta-)player. The game ends when the mouse falls within the sensing range of one or more cats. A cat tries to determine its optimal strategy to minimize the worse case expected detection time of the mouse. The mouse tries to determine an optimal counter movement strategy to maximize the expected detection time. We divide the problem into two cases based on the relative sensing capabilities of the cats and the mouse. When the mouse has a sensing range smaller than or equal to the cats, we develop a dynamic programming solution for the mouse’s optimal strategy, assuming high level information about the cats’ movement model. We discuss how the cats’ chosen movement model will affect its presence matrix in the network, and hence its payoff in the game. Extensive experimental results verify and illustrate the analytical results, and evaluate the games’ payoffs as a function of several important system parameters.

Added 2007-09-13

Mitigating Denial-of-Service Attacks in MANET by Incentive-based Packet Filtering: A Game-theoretic Approach

CERIAS TR 2007-53
Xiaoxin Wu, David K. Y. Yau
Download: PDF

Defending against denial-of-service attacks (DoS) in a mobile ad hoc network (MANET) is challenging because the network topology is dynamic and nodes are selfish. In this paper, we propose a DoS mitigation technique that uses digital signatures to verify legitimate packets, and drop packets that do not pass the verification. Since nodes are selfish, they may not perform the verification in order to avoid paying the overhead. A bad packet that escapes verification along the whole network path will bring a penalty to all its forwarders. A network game can be formulated in which notes along a network path, in optimizing their own benefits, are encouraged to act collectively to filter out bad packets. Analytical results show that Nash equilibrium can be attained for players in the proposed game, and significant benefits can be provided to forwarders such that many of the bad packets will be eliminated by verification.

Added 2007-09-13

SECURE AND PRIVATE ONLINE COLLABORATION

CERIAS TR 2007-62
Keith Frikken
Download: PDF
Added 2007-09-13

PRIVACY ENHANCED AUTOMATED TRUST NEGOTIATION

CERIAS TR 2007-63
Jiangtao Li
Download: PDF
Added 2007-09-13