Professional Documents
Culture Documents
Deris Stiawan
(C|EH. C|HFI)
Communication Network and Security Research Lab (COMNETS) Faculty of Computer Science Universitas Sriwijaya www.comnets.unsri.ac.id
Introduction
The paradigm of Research & Practical environment Research minimum requirement for diploma/ bachelor / master / PhD Research = your personal (Spirit, study hard, independent) + Environment & never give up Output from Research
The Result with your statement, your approach / method, system, etc To Introduce & future work for another researchers To share your finding within Publications
Reliability = Availability
+ Performance
Security
CSI/FBI (2010)
Analysis of update delays in signature-based network intrusion detection systems Computers & Security, Volume 30, Issue 8, November 2011, Pages 613-624 Hugo Gascon, Agustin Orfila, Jorge Blasco
Research Fields
1. Network Attack
Existing dataset or developing our data Analysis of attack
How to sniffing and read the packet from RAW data Classification, Clustering and statistical of data
Research opportunity ;
Network Defense : Firewall, IDS / IPS (hybrid, accuracy, prediction, active, smart and extensible) Email protection, spam filtering, malware identification, etc Statistical data Clustering / classification data with Soft computing approach (SOM, PSO, AI, fuzzy, etc) The results : algorithm, method or systems
2. Forensic Investigator
Existing dataset or developing our data Mobile Device / Phone
File system
Network / Host
Analysis the worm, DoS, XSS, SQL injection attack Log, traffic, alert, etc RAM, Card, HD, File system (IOS, NTFS, HFS+, Ext, FAT, etc)
Evidence
How to evidence the sources How to find the malicious and analyzing the intrusion How to get the old data, corrupted data, or erased data Recover the data
Network forensics based on fuzzy logic and expert system Computer Communications, Volume 32, Issue 17, 15 November 2009, Pages 1881-1892 Niandong Liao, Shengfeng Tian, Tinghua Wang
Research opportunity ;
Expert in tools : FTK, ENCASE, etc Forensic in network
Log system, log from host, etc File system: MBR, images, registry, kernel, etc
3. Cloud Computing
Development of previously technology
Grid computing, Distributed Systems, ASP (Application Service Provider) Service Oriented Architecture (SOA) Web services : XML, Jason, WSDL, J2ME, Cross platform, etc Mobile computing, real time
A survey on security issues in service delivery models of cloud computing Journal of Network and Computer Applications, Volume 34, Issue 1, January 2011, Pages 1-11 S. Subashini, V. Kavitha
A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing Future Generation Computer Systems, Volume 28, Issue 6, June 2012, Pages 833-851 Md. Tanzim Khorshed, A.B.M. Shawkat Ali, Saleh A. Wasimi
Addressing cloud computing security issues Future Generation Computer Systems, Volume 28, Issue 3, March 2012, Pages 583-592 Dimitrios Zissis, Dimitrios Lekkas
Research opportunity ;
Security sides :
Infrastructure as a services Hardware as a services
Surveying and Analyzing Security, Privacy and Trust Integrity: Certificate Authority, Certificate digital, PKI, ISAKMP, LDAP, etc QoS: Session key, Scheduling algorithm, Authentication method: physical, AAA, RADIUS
4. Heterogeneous Network
Integrated and combined the cloud Unified communication: voice, images and video multicast Integrated mobile tech, real time and reliable Quality of services & cross platform
traffic, bandwidth, services, etc
Brokers as a middleware, to connected the node to cloud How to management it (monitoring, access and control)
Capability adaptation algorithm based on joint network and terminal selection inheterogeneous networks The Journal of China Universities of Posts and Telecommunications, Volume 18, Supplement 1,September 2011, Pages 76-82
Resource competition in a converged heterogeneous networking Computer Networks, Volume 55, Issue 7, 16 May 2011, Pages 1549-1559 Abbas Jamalipour, Farshad Javadi, Kumudu S. Munasinghe
Research opportunity ;
Develop a topology of network to create the dataset, combining technology of Cloud, wireless and mobile SLA Protocol : integrated IPv4 IPv6 & how to integrated the devices with heterogeneous network Result : the new system, improved from existing, implementation framework based on open sources
5. Network Graph
How to shows the vulnerability for dynamic attacks Graph the correlation and interconnections Easy to manages and maintenance network Extensible and hybrid
Network analysis of temporal trends in scholarly research productivity Journal of Informetrics, Volume 6, Issue 1, January 2012, Pages 97-110 Hyoungshick Kim, Ji Won Yoon, Jon Crowcroft
Fast detection and visualization of network attacks on parallel Computers & Security, Volume 28, Issue 5, July 2009, Pages 276-288 Hyunsang Choi, Heejo Lee, Hyogon Kim
Research opportunity ;
Graph based on bayesian, SOM, etc Socket programming, tools matlab, etc Graph of DoS, malware, scanning attack
6. Network Management
Unified Threat Management Early system & monitoring for security officer = network monitoring center / network operating center How to get SNMP from different devices
Research opportunity ;
One stop monitoring & management network
Tools : Netflow, MRTG, OPManager, the dude
Integrated network management and control Network coordinate, analytic & behavior based on soft computing
THANK YOU