21
CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. [email protected]

CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. [email protected]

Embed Size (px)

Citation preview

Page 1: CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. cshue@cs.wpi.edu

CS 525 – Network Security

Spring 2012

Instructor

Craig Shue, Ph.D.

[email protected]

Page 2: CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. cshue@cs.wpi.edu

Who Are You?

• 4 Graduate CS• 3 Graduate ECE• 5 Undergrad CS

Page 3: CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. cshue@cs.wpi.edu

Professor Background

• Dr. Craig Shue– Assistant Professor of Computer Science– Background:

• Indiana University – MS: 2006; Ph.D – 2009• Oak Ridge National Laboratory – Cyber Security

Research Scientist – 2009 to present

– Courses:• Networking, Network Security

– Research:• New Internet Architectures• Security Measurements• Developing protocols and techniques

Page 4: CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. cshue@cs.wpi.edu

What is the Goal?

• Instructor– Help students develop

skills in CS research• Applies broadly, not just

network security

– Help students learn to share their ideas

• Presentations• Research papers

– Provide career foundation• Net. Sec. Jobs• MQPs• Theses/ISPs

• Students– Learn to read/understand

research papers quickly– Learn to present ideas to

peers– Actively participate in

discussion– Learn how to build/evaluate

an experiment– Produce peer-review

quality papers• Literature Reviews• LaTeX/BibTeX

Page 5: CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. cshue@cs.wpi.edu

What to Expect in Lecture

• A student-led paper discussion• Occasional instructor-led discussions• Tools/Techniques of the Trade Discussion• Research project progress reports

Page 6: CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. cshue@cs.wpi.edu

You need to talk!

• Presenting papers• Asking questions• Sharing ideas• Advancing the discussion

• Oral communication influences success in life• You will be called on if you do not participate

– Your choice: being “cold called” or offering things you’ve thought about more

• Also, it is half your grade in this class

Page 7: CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. cshue@cs.wpi.edu

But you need to listen too!

• We are not politicians… we actually have to listen and respond to each other

• Take notes if you think you’ll forget a point• Remember to keep your cool

– People will disagree with you all the time, but it isn’t personal. Hear them out.

– People will be wrong. Get over it. Try to provide correct information politely.

Page 8: CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. cshue@cs.wpi.edu

You can talk to me!

• Drop by my office• Set up an appointment• Email me

• This class is different from most– It is loosely structured, but intense– Research is an acquired skill; you can’t just study

• So if you’re having trouble, ask!– Other people likely have the same concerns

Page 9: CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. cshue@cs.wpi.edu

Class Structure

• Class Participation (50%)– Reviews of papers by 9am on class day– Discussions and participation

• Research Project (50%)– Individual or pairs– Topics

• Instructor provided• Your own ideas with instructor approval

– Outside of class research meetings• Keeps class sessions for shared discussion

Page 10: CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. cshue@cs.wpi.edu

Official Communication

• Class discussion• Hand-outs• Emails• Course Web page• Team Meetings

• If something is transmitted through one of these mediums, it has been communicated– If you miss class, you’re responsible for missed material

(have a friend give you notes)– You are responsible for receiving class emails

Page 11: CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. cshue@cs.wpi.edu

Research Project

Page 12: CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. cshue@cs.wpi.edu

What is original research?

• US Federal Government:– “Research means a systematic

investigation, including research development, testing and evaluation, designed to develop or contribute to generalizable knowledge.”

– Code of Federal Regulations: Title 45, Part 46

• Original research indicates this investigation cannot simply be drawing from other sources

Page 13: CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. cshue@cs.wpi.edu

Scientific Research

• Theory or experimentation that must be– Replicable

• Others must be able to confirm your results

– Falsifiable• There must be a means to prove the idea wrong• “A will be better than B”

– Not falsifiable: no metrics to evaluate “better than”

• “A will be twice as fast as B”– Falsifiable: test the speed of both

– Unbiased• Yes, you want the work to succeed, but you must be

distanced enough to give it a chance to fail.• To do otherwise is, well, fraud.

Page 14: CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. cshue@cs.wpi.edu

Example Network Security Research Directions

• Build (Innovate)• Measure• Analyze• Test• Attack

Page 15: CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. cshue@cs.wpi.edu

Propose the Project

• Decide on a research project and write a proposal for it by January 25

• Proposal should be a one-page write-up• You should talk to me about your idea before

you formally write it up to make sure it’s sufficient

• Don’t have ideas?– No sweat. I have avenues I’d like to see

explored. You can take one and run with it or use it for inspiration.

Page 16: CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. cshue@cs.wpi.edu

LaTeX and BibTeX

• Scholarly work in Computer Science is often done in LaTeX and BibTeX– Some use Word still. It does not look as nice.

• You will do your work in this class in LaTeX with BibTeX for your references

• It uses markup like writing HTML• Fairly easy to get started. Harder to become an

expert.• Resource:

http://www.maths.tcd.ie/~dwilkins/LaTeXPrimer/

Page 17: CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. cshue@cs.wpi.edu

Using LaTeX

• The project proposal must be created with LaTeX. Send both the PDF and the source code.

Page 18: CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. cshue@cs.wpi.edu

The Heilmeier Catechism

• Named after George Heilmeier (CEO Belcore)– What are you trying to do? Articulate your objectives using

absolutely no jargon.– How is it done today, and what are the limits of current

practice?– What's new in your approach and why do you think it will

be successful?– Who cares? If you're successful, what difference will it

make?– What are the risks and the payoffs?– How much will it cost? How long will it take?– What are the midterm and final "exams" to check for

success?

Page 19: CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. cshue@cs.wpi.edu

Project Ideas

• Covert Channels• Marco Polo• Haven’t we met?• ISP Subnetting Reverse Engineering• Protecting Privacy with Pollution• Protecting Privacy with Privacy-Enhanced

Advertising

Page 20: CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. cshue@cs.wpi.edu

Today’s Readings

1. P. Fong, "Reading a computer science research paper," Inroads, the SIGCSE Bulletin, 2009.

2. S. Keshav, "How to read a paper," ACM Computer Communication Review, 2007.

Page 21: CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D. cshue@cs.wpi.edu

Reading for Next Time

• R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The second-generation onion router," in Proceedings of the 13th conference on USENIX Security Symposium-Volume 13. USENIX Association, 2004, pp. 21 - 21.