
NSF Org: |
CNS Division Of Computer and Network Systems |
Recipient: |
|
Initial Amendment Date: | August 28, 2012 |
Latest Amendment Date: | August 28, 2012 |
Award Number: | 1228847 |
Award Instrument: | Standard Grant |
Program Manager: |
Kevin Thompson
kthompso@nsf.gov (703)292-4220 CNS Division Of Computer and Network Systems CSE Directorate for Computer and Information Science and Engineering |
Start Date: | September 1, 2012 |
End Date: | August 31, 2018 (Estimated) |
Total Intended Award Amount: | $1,080,445.00 |
Total Awarded Amount to Date: | $1,080,445.00 |
Funds Obligated to Date: |
|
History of Investigator: |
|
Recipient Sponsored Research Office: |
3141 CHESTNUT ST PHILADELPHIA PA US 19104-2875 (215)895-6342 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
3141 Chestnut St. Philadelphia PA US 19104-2816 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): | Secure &Trustworthy Cyberspace |
Primary Program Source: |
|
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.070 |
ABSTRACT
The Wireless Philadelphia Network (WPN) is a metropolitan?area network (MAN) consisting of thousands of Tropos 5210 wireless mesh routers distributed across the entire city of Philadelphia and connected by a fiber backbone. This project is employing this network as a testbed to investigate three diverse security challenges facing any large-scale wireless network servicing a heterogeneous population. The first challenge is in efficient network anomaly detection algorithms, and the proposed solution is to investigate the efficacy of both compressive sampling and distributed source coding based approaches in reducing the amount of data that must be transmitted to the anomaly detector. The second challenge is physical layer security in wireless networks, and the proposed solution is to use physical layer based encryption algorithms and user authentication. The third challenge is anomaly detection at the application layer, in particular for web servers, and the proposed solution is to develop software sensors on the hardware, operating system, virtual machine, and application server, and develop rules for identifying possible anomalies using these metrics. Besides the intellectual merit of these challenges, the project has several broader impacts. First, low-income residents gain Internet access through integration with the Freedom Rings Partnership. Second, students participate in community service based engineering design projects. Finally, curricular enhancements and the recruitment of women and minority graduate students improve the educational and diversity missions at our university.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
PROJECT OUTCOMES REPORT
Disclaimer
This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.
This project mainly investigated three aspects of network security: i) state measurement and aggregation techniques for local network anomaly detection; ii) physical layer security for wireless network; iii) web server anomaly detection for civic services.
In the aspect of state measurement and aggregation techniques for local network anomaly detection, we proposed and evaluated an anomaly detection algorithm using compressed signals and a distance-based subspace anomaly detector. In addition, we implemented two distributed anomaly detection algorithms based on principal component analysis and analyzed the tradeoff between communication cost incurred by the distributed algorithm and the anomaly detection accuracy. We also analyzed the influence of training sample size on the anomaly detection accuracy and derived upper bound on the accuracy of the subspace obtained by the training data and an approximation to the anomaly detection error rate. We studied the problem of detecting denial-of-service attacks in wireless networks based on log-likelihood ratio test using Markov chain modeling. Finally, with respect to the problem of optimal transmission of distributed correlated discrete memoryless sources across a network with capacity constraints, we showed important structural properties of the polytope of feasible solutions, and investigated primal-dual based algorithms for finding the optimal solution. Next, we developed a comprehensive understanding of the set of feasible rates for the sensor encoders and how the network capacity constraints impact the feasibility of the vertices of the Slepian-Wolf rate region. We demonstrated a connection between conditional independence relationships amongst the sensors and the complexity of the optimization problem. We have shown that a decomposed/layered approach to solving the posed optimization problem, in general, leads to a suboptimal solution.
In the aspect of physical layer security for wireless network, we obtained significant results confirming that channel state information is a suitable source for physical layer security schemes leveraging reconfigurable antennas. Furthermore, we designed a practical sampling technique based on timer-based interrupts for implementing real-time wireless physical layer encryption techniques on standards-compliant devices. Finally, we invented a preamble-obfuscation technique for securing wireless devices from sophisticated cyber-attacks.
In the aspect of web server anomaly detection for civic services, we designed an online automatic malware detection and classification system. Using the extracted features from live process-level system calls obtained by various sensors deployed on production hosts, the “quickest change” data fusion center can detect malware infection as quickly as possible. In addition, we evaluated the effectiveness of three machine learning based algorithms in detecting malware infections using system-call features. For malware classification, we evaluated our proposed malware classification system’s performance on data collected from production environments and experimentally identify the feature extraction, detection, and classification techniques that achieved high detection accuracy with low cost.
Last Modified: 10/09/2018
Modified by: Steven Weber
Please report errors in award information by writing to: awardsearch@nsf.gov.