Example: Data Mining for the NBA - The University of Texas at Dallas

advertisement
Data and Applications Security
Developments and Directions
Dr. Bhavani Thuraisingham
The University of Texas at Dallas
Introduction to the Course
August 30, 2013
Objective of the Unit
 This unit provides an overview of the course. The course describes
concepts, developments, challenges, and directions in data and
applications security. Topics include
- database security, distributed data management security, object
security, data warehouse security, data mining for security
applications, privacy, secure semantic web, secure digital
libraries, secure knowledge management and secure sensor
information management, biometrics
Outline of the Unit
 Outline of Course
 Course Work
 Course Rules
 Contact
 Appendix
Outline of the Course
 Unit #1: Introduction to Data and Applications
 Part I: Background
- Unit #2: Data Management
- Unit #3: Information Security
- Unit #4: Information Management
 Part II: Discretionary Security
- Unit #5: Concepts
- Unit #6: Policy Enforcement
 Part III: Mandatory Security
- Unit #7: Concepts
- Unit #8: Architectures
including Semantic Web
Outline of the Course (Continued)
 Part IV: Secure Relational Data Management
- Unit #9: Data Model
- Unit #10: Functions
- Unit #11: Prototypes and Products
 Part V: Inference Problem
- Unit #12: Concepts
- Unit #13: Constraint Processing
- Unit #14: Conceptual Structures
 Part VI: Secure Distributed Data Management
- Unit #15: Secure Distributed data management
- Unit #16: Secure Heterogeneous Data Integration
- Unit #17: Secure Federated Data Management
Outline of the Course (Continued)
 Part VII: Secure Object Data Management
-
Unit #18: Secure Object Management
Unit #19: Secure Distributed Objects and Modeling Applications
Unit #20: Secure Multimedia Systems
 Part VIII: Data Warehousing, Data Mining and Security
-
Unit #21: Secure Data Warehousing
Unit #22: Data Mining for Security Applications
Unit #23: Privacy
Additional Lectures:

Insider Threat Detection

Reactively Adaptive Malware
Outline of the Course (Continued)
 Part IX: Secure Information Management (Oct 25, Nov 1, Nov 8)
-
Unit #24: Secure Digital Libraries
Unit #25: Secure Semantic Web (web services, XML security)
Unit #26: Secure Information and Knowledge Management
Additional Topics

Secure Web Services and identity management

Social Network Security and Privacy

Secure cloud computing and secure cloud query processing
 Part X: Dependable data management and forensics (Nov 15)
-
Unit #27: Secure Dependable Data Management
Unit #28: Secure Sensor and Wireless Data Management
Unit #29: Other Technologies, e.g., digital forensics, biometrics, etc.
Outline of the Course (Continued)
 Part XI: Emerging Technologies (November 22)
-
TBD
 Unit #30 Conclusion to the Course
Tentative Schedule
 August 30: Introduction
 September 6: Policies and Access Control
 September 13: Multilevel Data Management
 September 20: Inference Problem
 September 27: Secure Distributed Data Management; Intro to Semantic Web
 October 4: Secure Objects, Data Warehousing, Data Mining, Security
 October 11: Data Mining for Malware Detection, Privacy, Review for Exam
 October 18: Exam #1
 October 25: Secure web services, Secure semantic web and XML security
 November 1: Secure Cloud Computing
 November 8: Secure Knowledge Management and Social Networking
 November 15: Secure Dependable Data Management, Digital Forensics
 November 22: Mobile phone security and special topics
 November 29: Holiday
 December 6: Selected project presentations and review
 December 13: Exam #2: 11am – 1:45pm
Tentative Schedule (new dates in red)
 Assignment #1 due date: September 20, 2013
 Assignment #2: due date: September 27, 2013
 Term paper #1: October 11, 2013
 Exam #1: October 18, 2013
 Assignment #3: October 25, 2013 (November 1, 2013)
 Assignment #4: November 1: 2013 (November 8, 2013)
 Term paper #2: November 8, 2013 (November 15, 2013)
 Project: November 22, 2013 (December 2, 2013)
 Exam #2TBD
Course Work
 Two term papers; each worth 8 points
 Two exams each worth 24 points
 Programming project worth 12 points
 Four homework assignments each worth 6 points
 Total 100 points
 Course Book: Database and Applications Security:
Integration Data Management and Information Security,
Bhavani Thuraisingham, CRC Press, 2005
 Will also include papers as reading material
Some Topics for Papers: Any topic in data and
applications security
 XML Security (will be discussed on October 25)
 Inference Problem
 Privacy
 Secure Biometrics (after exam #1)
 Intrusion Detection
 E-Commerce Security (will be discussed after exam #1)
 Secure Sensor Information Management (after exam #1)
 Secure Distributed Systems
 Secure Semantic Web (after exam #1)
 Secure Data Warehousing
 Insider Threat Analysis
 Secure Multimedia/geospatial Systems
 Malware detection
 Policies and access control
 Designs of multilevel secure databases
Term Papers: Example Format
 Abstract
 Introduction
 Background on the Topic
 Survey of various techniques, designs etc, (e.g., access
control policies, inference control methods)
 Analyze the techniques, designs etc. and give your opinions
 Directions for further work
 Summary and Conclusions
 References
Term Papers: Example Format - II
 Abstract
 Introduction
 Background on the Topic and Related Work
 Discuss strengths and weaknesses of others’ work
 Give your own design and say why it is better
 Directions for further work
 Summary and Conclusions
 References
Project Report Format
 Overview of the Project
 Design of the System
 Input/Output
 Future Enhancements
 References
Some Project Topics
 Quivery Modification on XML Documents
 Access control for web systems
 Intrusion detection system
 Access control for multimedia systems
- E.g., access control for image, video
 Role-based access control system
 Access control for object systems
 Secure data warehouse
Course Rules
 Course attendance is mandatory; unless permission is obtained
from instructor for missing a class with a valid reason
(documentation needed for medical emergency for student or a
close family member – e.g., spouse, parent, child). Attendance will
be collected every lecture. 3 points will be deducted out of 100 for
each lecture missed without approval.
 Each student will work individually
 Late assignments will not be accepted. All assignments have to be
turned in just after the lecture on the due date
 No make up exams unless student can produce a medical certificate
or give evidence of close family emergency
 Copying material from other sources will not be permitted unless the
source is properly referenced
 Any student who plagiarizes from other sources will be reported to
the appropriate UTD authroities
Assignment #1, 2, 3, 4
Assignment #1: Posted in Lecture 8
Assignment #2 Posted in Lecture 11
Assignment #3: Posted in Lecture 19
Assignment #4: Posted in Lecture 24
Papers to Read for Exam #1
- RBAC: Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein,
-
-
Charles E. Youman: Role-Based Access Control Models. IEEE
Computer 29(2): 38-47 (1996)
UCON: Jaehong Park, Ravi S. Sandhu: The UCONABC usage
control model. ACM Trans. Inf. Syst. Secur. 7(1): 128-174
(2004) - first 20 pages
DCON: Roshan K. Thomas, Ravi S. Sandhu: Towards a Multidimensional Characterization of Dissemination Control.
POLICY 2004: 197-200 (IEEE)
Bhavani M. Thuraisingham: Mandatory Security in ObjectOriented Database Systems. OOPSLA 1989: 203-210
Bhavani M. Thuraisingham, William Ford: Security Constraints
in a Multilevel Secure Distributed Database Management
System. IEEE Trans. Knowl. Data Eng. 7(2): 274-293 (1995)
(distributed inference control)
Papers to Read for Exam #1
- Rakesh Agrawal, Ramakrishnan Srikant: Privacy-Preserving
-
-
Data Mining. SIGMOD Conference 2000: 439-450
Elisa Bertino, Bhavani M. Thuraisingham, Michael
Gertz, Maria Luisa Damiani: Security and privacy for
geospatial data: concepts and research directions. SPRINGL
2008: 6-19
Mohammad M. Masud, Latifur Khan, Bhavani M.
Thuraisingham: A Hybrid Model to Detect Malicious
Executables. ICC 2007: 1443-1448
Pallabi Parveen, Nate McDaniel, Varun S. Hariharan, Bhavani
M. Thuraisingham, Latifur Khan: Unsupervised Ensemble
Based Learning for Insider Threat
Detection SocialCom/PASSAT 2012: 718-727
Bhavani M. Thuraisingham: Data Mining, National Security,
Privacy and Civil Liberties. SIGKDD Explorations 4(2): 1-5
(2002)
Suggested papers for Malware detection
- Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham: EMail Worm Detection Using Data Mining. IJISP 1(4): 47-61 (2007)
- Mohammad M. Masud, Latifur Khan, Bhavani M.
Thuraisingham, Xinran Wang, Peng Liu, Sencun Zhu: Detecting
Remote Exploits Using Data Mining. IFIP Int. Conf. Digital Forensics
2008: 177-189
- Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingham: A new
intrusion detection system using support vector machines and
hierarchical clustering. VLDB J. 16(4): 507-521 (2007)
Index to Lectures for Exam #1
Introduction to course
Lecture 1: Introduction to data and applications security
Lecture 2: Cyber security modules (extra credit)
Lecture 3: Access control
Lecture 4: Malware (extra credit)
Lecture 5: Data Mining (will not be included)
Lecture 6: Data and application development security
Lecture 7: Multilevel secure data management
Lecture 8: Assignment #1
Lecture 9: Inference problem – 1
Lecture 10: Inference problem – 2
Lecture 11: Assignment #2
Index to Lectures for Exam #1
Lecture 12: Unsupervised ensemble based learning for
insider threat
Lecture 13: Secure distributed data management (will
include information sharing)
Lecture 14: Intro to semantic web (not included in exam)
Lecture 15: Secure object
Lecture 16: Data warehouse, data mining security
Lecture 17: Data mining for malware detection
Lecture 18: Privacy
Lecture 19: Assignment #3
Note: Inference problem or secure distributed data will also
distributed inference control
Papers to Read for Exam #2 (Cloud)
- Bhavani M. Thuraisingham, Vaibhav Khadilkar, Anuj Gupta, Murat
-
-
Kantarcioglu, Latifur Khan: Secure data storage and retrieval in
the cloud. CollaborateCom 2010:1-8 (Relational HIVE + XACML)
Mohammad Farhan Husain, Latifur Khan, Murat
Kantarcioglu, Bhavani M. Thuraisingham:Data Intensive Query
Processing for Large RDF Graphs Using Cloud Computing
Tools.IEEE CLOUD 2010: 1-10 (background paper, not for
exam))
Arindam Khaled, Mohammad Farhan Husain, Latifur Khan, Kevin
W. Hamlen, Bhavani M. Thuraisingham: A Token-Based Access
Control System for RDF Data in the Clouds.CloudCom 2010:
104-111 (RDF + XACML))
Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav
Khadilkar, Bhavani M. Thuraisingham: Design and Implementation
of a Cloud-Based Assured Information Sharing System. MMMACNS 2012:36-50 (RDF Only for data and policies)
Papers to Read for Exam #2 (Misc)
- Elisa Bertino, Barbara Carminati, Elena Ferrari, Bhavani M.
-
-
Thuraisingham, Amar Gupta: Selective and Authentic ThirdParty Distribution of XML Documents. IEEE Trans. Knowl.
Data Eng. 16(10): 1263-1278 (2004) (October 25/Nov 1) – the
proofs are not necessary – up to section 6
Elisa Bertino, Latifur R. Khan, Ravi S. Sandhu, Bhavani M.
Thuraisingham: Secure knowledge management:
confidentiality, trust, and privacy. IEEE Transactions on
Systems, Man, and Cybernetics, Part A (TSMC) 36(3):429-438
(2006)
David W. Chadwick, George Inman: Attribute Aggregation in
Federated Identity Management. IEEE Computer 42(5): 3340 (2009) (November 1, 2013)
Jungin Kim, Bhavani M. Thuraisingham: Dependable and
Secure TMO Scheme. ISORC 2006: 133-140
Papers to Read for Exam #2 (Social Networks)
- Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat
-
Kantarcioglu,Bhavani M. Thuraisingham: A semantic web
based framework for social network access control. SACMAT
2009:177-186
Raymond Heatherly, Murat Kantarcioglu, Bhavani M.
Thuraisingham: Preventing Private Information Inference
Attacks on Social Networks. IEEE Trans. Knowl. Data Eng.
(TKDE) 25(8):1849-1862 (2013) (just understand the basic
concepts in this paper; math detailed are not necessary)
Some Suggested Papers
(Not included for Exam #2)
- Tyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani
M. Thuraisingham: Transforming provenance using
redaction. SACMAT 2011:93-102
- Tyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani
M. Thuraisingham: A language for provenance access
control. CODASPY 2011:133-144
- Timothy W. Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi S.
Sandhu, William H. Winsborough, Bhavani M. Thuraisingham:
ROWLBAC: representing role based access control inOWL. SACMAT
2008:73-82
- Secure Biometrics
- http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.811
0&rep=rep1&type=pdf
Index to Lectures for Exam #2
Lecture 20 – Secure web services
Lecture 21 – Trustworthy semantic web
Lecture 22 – Secure third party publication
Lecture 23 – Secure Cloud
Lecture 24 – Assignment #4
Lecture 25 – Data intensive query processing + security
Lecture 26 – Attribute aggregation in federated identity
Lecture 27 – Secure knowledge management
Lecture 28 – Semantic web and social networks
Lecture 29 – Security and privacy for social networks
Lecture 30 – Virtualization and security
Lecture 31 – Secure Dependable data management
Index to Lectures for Exam #2
Lecture 32 - Hadoop/MapReduce
Lecture 33 – Digital Forensics / Biometrics
Lecture 34 – Cloud-based Assured Information Sharing
Lecture 35 – ROWLBAC = RBAC + OWL
Lecture 36 – Data Provenance
Lecture 37 – Database Vulnerabilities
Lecture 38 – Data, Information and Knowledge Management
Lecture 39 – Big Data, No-SQL
Lecture 40 – Mission Assurance – Building Trusted
Applications from Untrusted Systems
Contacts: Instructor
- Dr. Bhavani Thuraisingham
- Louis Beecherl Distinguished Professor of Computer Science
- Executive Director of the Cyber Security Research and
Education Institute
- Erik Jonsson School of Engineering and Computer Science
- The University of Texas at Dallas Richardson, TX 75080
- Phone: 972-883-4738
- Fax: 972-883-2399
- Email: bhavani.thuraisingham@utdallas.edu
- URL:http://www.utdallas.edu/~bxt043000/
Contacts: Teaching Assistant
 Mohammed Iftekhar
 mxi110930@utdallas.edu
Teaching Assistant
Computer Science
PhD, Computer Science
Erik Jonsson Sch of Engr & Com
Download