120 likes | 211 Views
Economic Development for the DFW Metroplex Related to Security: An Academic Perspective. Dr. Bhavani Thuraisingham The University of Texas at Dallas. December 2006. Contact Information.
E N D
Economic Development for the DFW Metroplex Related to Security: An Academic Perspective Dr. Bhavani Thuraisingham The University of Texas at Dallas December 2006
Contact Information • Dr. Bhavani Thuraisingham Professor of Computer Science and Director of Cyber Security Research Center The University of Texas at Dallas Richardson, TX 75083 Phone: 972-883-4738 Fax: 972-883-2349 bhavani.thuraisingham@utdallas.edu www.utdallas.edu/~bxt043000/
Areas for Economic Development related to Security • Border Security • Technologies for protecting the borders will have an impact on the economy • Education • Build an educated workforce • Inland Port • Technologies for Inland Port to promote trade with China and other countries • Why we should not outsource data yet • Serious security and privacy concerns
Border Security • We need to monitor the borders and ports to prevent and detect terrorism • Our research is focusing on the following topics for national security • Surveillance for suspicious events • Data mining for Counter-terrorism • RFID data management • Cannot forget about PRIVACY
Video Surveillance and Suspicious Event Detection • Huge amounts of video data available in the security domain • Need for tools to aid human analyst; pointing out areas in video where unusual activity occurs; • We have developed a system to detect suspicious events • Biometrics for Face detection • Investigating Privacy Preserving Surveillance
What is Data Mining? Information Harvesting Data Mining Knowledge Mining Knowledge Discovery in Databases Data Dredging Data Archaeology Data Pattern Processing Siftware Database Mining Knowledge Extraction The process of discovering meaningful new correlations, patterns, and trends by sifting through large amounts of data, often previously unknown, using pattern recognition technologies and statistical and mathematical techniques (Data Mining: Technologies, Techniques, Tools and Trends, CRC Press, 1998 Author: Bhavani Thuraisingham)
Data Mining for Counterterrorism: Non-real-time Analysis • Gather data from multiple sources • Information on terrorist attacks: who, what, where, when, how • Personal and business data: place of birth, ethnic origin, religion, education, work history, finances, criminal record, relatives, friends and associates, travel history, . . . • Unstructured data: newspaper articles, video clips, speeches, emails, phone records, . . . • Integrate the data, build warehouses and federations • Develop profiles of terrorists, activities/threats • Mine the data to extract patterns of potential terrorists and predict future activities and targets • Find the “needle in the haystack” - suspicious needles? • Need to maintain PRIVACY • Privacy Preserving Data Mining
RFID Data Management • RFID: Radio Frequency Identifier • We are developing a data management system to manage the RFID data streams emanating from the tags • Query processing in data streams • Security and privacy techniques to ensure authorized access and privacy of individuals • Digital identity management
Security Education at the University of Texas at Dallas (UTD) • We are NSA/DHS Center for Excellence on Information Assurance Education • Focus areas include: System security, Data and Applications security, Network security, Secure geospatial data management • Strong team also focusing on data mining for national security as well as cyber security • Also developing system for Emergency Preparedness • Research for NSF, Air Force, EPA, DFW Corporations, and discussing plans with DHS • Strong collaboration with Industry through contracts and student worker positions
Technologies for Inland Port Creation • Data Mining and Knowledge Management technologies will strengthen DFW position in becoming the major city in USA for trade • DFW is the 8th largest city in US, has one of the nation’s largest hub airport in the heart of the country with easy access to almost every city in US and several countries • We must get the nonstop route to/from Beijing • Data mining will help us to determine who our competitors are, what are their strategies, what actions do we need to take? • Knowledge management technologies will improve e-business, supply chain management, enterprise resource planning, enterprise security, all critical for trade • UTD has strength in both data mining and knowledge management technologies; we are also conducting research on supply chain management and e-business
Outsourcing Data • Daily we are hearing about job losses due to outsourcing • We need to be very careful when outsourcing our critical data • Accounting data, Income tax data, etc. • Maintaining security and privacy for outsourced data is very difficult at present • We are conducting research on querying encrypted data and practical solutions are yet to be developed; need lot more research • Even if key attributes are suppressed, Inference Problem may be possible • We don’t want our precious and valuable data to go into the wrong hands • Tradeoffs between Outsourcing and Security
In Summary • Continue with Border security activities with attention to Privacy • Education is our strength; promote Math and Science in DFW; encourage people from other states to migrate to DFW for our education; close collaboration with Industry • Develop technologies to enable DFW become a major Indoor port for USA and our Trade partners • Be careful about outsourcing our data and conduct research on security solutions