250 likes | 382 Views
Imad H. Elhajj American University of Beirut Electrical and Computer Engineering ie05@aub.edu.lb ITU Academia Seminar September 28, 2011. Potential Collaboration between ITU and Academia on Cyber Security. Macro. Macro. Micro. Nano. Nano. Play. Office. AUB (Founded in 1866).
E N D
Imad H. Elhajj American University of Beirut Electrical and Computer Engineering ie05@aub.edu.lb ITU Academia Seminar September 28, 2011 Potential Collaboration between ITU and Academia on Cyber Security
Play Office
Electrical and Computer Engineering AUB • 7,500 students • 73-acre Campus ECE • 620 Undergraduate students • 50 Graduate students • 26 Full-time faculty members • Opportunities for graduate students and collaboration
Areas of Research Synchronization Multimedia VoIP Networking Security Security Intrusion & Spoofing Detection Localization Synchronization Clustering Robot Integration Sensor Networks Control & Instrumentation Hardware Medical & Environmental Devices Algorithms
Security Group At AUB • Dr. Ayman Kayssi • Dr. Ali Chehab • Dr. Imad Elhajj • 3 PhD Students • 8 MS Students
Graduate Courses Offered • Cryptography and Computer Security • Internet Security • Wireless Security • Information Security Management • Network and Computer Security Laboratory
Laboratory Description This laboratory addresses advanced network and computer security topics. Experiments include the execution of attacks, the setup of intrusion detection and prevention, securing computers and wired and wireless networks, and digital forensics.
Topics Covered • Section 1 — Networking Basics - How do networks work? • Lab 1: Security Lab Setup and Networking Basics • Section 2 — Vulnerabilities and Threats - How can networks be compromised? • Lab 2: Scanning and Enumerating the Network for Targets and Address Spoofing • Lab 3: Denial of Service Attacks and Network Applications Exploits • Lab 4: Malware Analysis and Botnets • Lab 5: Escalating Privilege – Sniffing, Keylogging, Password Cracking and Man in the Middle Attacks • Lab 6: Security in Wireless Systems • Section 3 — Prevention - How do we prevent harm to the networks? • Lab 7: Firewalls • Lab 8: Hardening the Host Computer and Securing Network Communications • Section 4 — Detection and Response – How do we detect and respond to attacks? • Lab 9: Preparing for and Detecting Attacks • Lab 10: Identify and Mitigate Network Attacks • Lab 11: Digital Forensics
Lab Objectives The objectives of this lab are to give students: • An applied understanding of the principles of network and computer security. • A hands-on experience in attack execution, and the use of tools in such attacks. • A hands-on experience in the use of intrusion detection and prevention systems and techniques. • The practical knowledge required to secure computers and networks including the setup of policies and security assessment. • The practical knowledge to conduct digital forensics and attack tracing
Cabinets Juniper IPS
Potential Uses • Customized training for industry • Testing and benchmarking of equipment • Vendor demonstrations • Lab could potentially be virtualized to duplicate at low cost
ITU Resolutions Relevant to AUB Collaboration • ITU Plenipotentiary Resolution 130: Strengthening the role of ITU in building confidence and security in the use of information and communication technologies (Guadalajara, 2010) • ITU WTDC Resolution 45: Mechanisms for enhancing cooperation on cybersecurity, including combating spam (Hyderabad, 2010) • ITU WTDC Resolution 69: Creation of national computer incident response teams, particularly for developing countries, and cooperation between them (Hyderabad, 2010) • ITU WTSA Resolution 58: Encourage the creation of national computer incident response teams, particularly for developing countries (Johannesburg, 2008) • UN Resolutions 57/239 (2002) and 58/199 (2004): Creation of a global culture of cybersecurity and the protection of critical information infrastructures
Potential Collaboration between ITU and AUB • Test lab for ITU-T standards conformance • Contributions to standards (ITU-T SG17). Several of the questions for Study Group 17 are areas of research at AUB • Organizing events (workshops, seminars) • Capacity building and Awareness • Help establish CERT (AUB Member of the PAN Arab Cyber Security Observatory)
Thank you ie05@aub.edu.lb