Shorten the Blind ( If necessary ) | Cordless Faux Wood Blind
Senior Project Ideas: Blind Communication & Internet Measurements
-
Upload
india-walton -
Category
Documents
-
view
32 -
download
0
description
Transcript of Senior Project Ideas: Blind Communication & Internet Measurements
Senior Project Ideas:
Blind Communication & Internet Measurements
Mehmet H. Gunes
P1
A1
P2A2
Domain-A Domain-C
Blind Communication What if you wanted to send a message to a system,
but did not want anyone to see it.• Multi-owner systems,
• Distributed collaboration tools,
• Cloud computing, …
2
Trusted Platform Module
3
BroadcomAsus
CryptographicProcessor
Random number generator
RSA key generator
SHA-1 hash generator
Encryption/decryption& signature engine
Persistent Memory
Endorsement Key (EK)
Storage Root Key (SRK)
Versatile Memory
Platform Configuration Registers (PCR)
Attestation Identity Keys (AIK)
Storage Keys
Sec
ure
d In
pu
t / O
utp
ut
Trusted Platform Module
4
PERSEUS security kernel
5
Hardware Layer
Resource Management Layer
Trusted Software Layer
Legacy O.S.
App App
Legacy O.S.
App AppCritical
ApplicationConfiguration
ApplicationLayer
Security Kernel
TC support
http://www.perseus-os.org
6
Web of interconnected networks• Grows with no central authority
• Autonomous Systems optimize local communication efficiency
• The building blocks are engineered and studied in depth
• Global entity has not been characterized
Internet
Need for Internet measurements arises due to commercial, social, and technical issues
• Realistic simulation environment for developed products,
• Improve network management
• Robustness with respect to failures/attacks
• Comprehend spreading of worms/viruses
• Know social trends in Internet use
• Scientific discovery
• Scale-free (power-law), Small-world, Rich-club, Dissasortativity,…
Internet Measurements
7
Internet Topology Measurement
8CAIDA 2006
Internet Topology Measurement
9CAIDA 2006
Internet Topology Measurement
10CAIDA 2006
Autonomous System Level Mapping
11
Historical
Autonomous System Level Mapping
12
Traffic Measurements Monitoring and measuring network traffic
• to produce better models of network behavior
• to diagnose failures and detect anomalies
• to defend against unwanted traffic
PlanetLab
13
Code-Red Worm On July 19, 2001, more than 359,000 computers connected to the
Internet were infected with the Code-Red (CRv2) worm in less than 14 hours
Spread
14
Sapphire Worm was the fastest computer worm in history
• doubled in size every 8.5 seconds
• infected more than 90 percent of vulnerable hosts within 10 minutes.
15
Witty Worm reached its peak activity after approximately 45 minutes
• at which point the majority of vulnerable hosts had been infected
World USA
16
Nyxem Email Virus Estimate of total number of infected computers is
between 470K and 945K At least 45K of the infected computers were also
compromised by other forms of spyware or botware
Spread
17
Scam Hosting Study dynamics of scam hosting infrastructure
18
Internet Measurements The Internet is man-made, so why do we need to
measure it?
• Because we still don’t really understand it• Sometimes things go wrong
• Malicious users
• Measurement for network operations• Detecting and diagnosing problems
• What-if analysis of future changes
• Measurement for scientific discovery• Creating accurate models that represent reality
• Identifying new features and phenomena
19
Questions ?
20