These are draft proposals, to give you a feeling of what types of project I am currently offering. If you are interested in any of them, please contact me, and we can if necessary discuss final versions adapted to your personal interests. I am also in general willing to supervise other projects in similar areas, for example in collaboration with industrial companies. If you have any proposals of this type, make sure to come and talk to me about them in good time, so we can get the details finalised well before the project is intended to start.
Robin Sharp
August 2007.
In this M.Sc. project, a tool based on causality analysis for debugging in a distributed system is to be specified and implemented. The task requires you to consider how relevant, causally related sub-states are to be specified and collected up, how the collected information is to be presented to the user and how non-deterministic phenomena are to be dealt with. In addition it is necessary to consider how the tool is to be incorporated into a distributed environment which, for example, has a processor pool architecture, as in a system intended for running applications based on the Grid Computing paradigm.
Prerequisites: 02222 Distributed Systems
In this M.Sc. project, a proposal for firewall control is to be made, which enables ports to be securely opened and/or closed on the firewalls in a dynamic manner, based on the needs of the submitted applications. The project will involve a study of the current state of the art in Grid systems, design of mechanisms for controlling the firewalls adaptively in a secure manner, and — to the extent that time permits — implementation of the design on a cluster of computers available at the department. The project is an element in a large research project on Grid Computing, in which IMM is involved in investigation of the security aspects of very large distributed computing systems.
Prerequisites: 02222 Distributed Systems, 02233 Network Security.
In this M.Sc. project, the aim is to investigate the use of a system for incremental trust management, in the sense that the degree of trust in a credential can rise and fall over time, depending on whether the activities attempted by a holder of the credential are acceptable or unacceptable from a security point of view. The project will involve an initial study of relevant literature on trust management, formulation of algorithms or heuristics for increasing and decreasing trust, and finally specification and — to the extent that time permits — implementation of an access control system based on a trust management engine which can deal with incremental trust. The project is an element in a large research project on Grid Computing, in which IMM is involved in investigation of the security aspects of very large distributed computing systems.
Prerequisites: 02222 Distributed Systems, 02230/02345 Computer Security.
In this project, the aim is to supplement the previous investigations with techniques based on unsupervised learning. Here the training process is not based on a previous classification by an expert, but on some kind of self-organising principle, such as cluster detection, principal components analysis, self-organising maps, entropy-based methods or stochastic machines. The project will involve a study of the literature on the use of unsupervised learning for intrusion detection, selection of one or more methods for evaluation, and the specification and development of a simple tool which exploits the chosen method(s) and which can provide the user with useful information about attack patterns which are observed in a real-life computer system.
Prerequisites: 02230/02345 Computer Security; 02233 Network Security.
The aim of this project is to develop a tool for automatically performing examination of log files, in order to be able to detect attacks, report their existence and, if possible, localise their origins. The project involves a study of suitable pattern recognition and data mining techniques, followed by specification and implementation of a tool which makes use of one or more of these techniques in order to supply investigators with timely and appropriate information.
Prerequisites: 02230/02345 Computer Security; 02233 Network Security.
In this M.Sc. project, the aim is to develop a calculus which includes the temporal aspects of the problem in a natural way. The starting point is expected to be Abadi et al.'s proposal, which is to be extended with syntactic and semantic elements for describing relevant temporal phenomena. The logic for reasoning about whether an access request can be granted under a given access control policy is then to be formulated and formalised within the framework of a proof assistant such as Isabelle. Finally, if time allows, the access control system can be implemented as a reference monitor for use in a practical distributed system, with a view to demonstrating the practical usefulness of the approach.
Prerequisites: 02243 Access Control, 02281 Data logic.
In this project, the aim is to analyse this situation from the point of view of providing adequate facilities in a secure manner to employees whose work involves a degree of mobility. The project will involve investigating and evaluating the security risks which this form of working creates for the company, and making one or more proposals for how to organise the company's computer systems in order to avoid these risks.
Prerequisites: 02222 Distributed Systems, 02230/02345 Computer Security; 02233 Network Security.
Cybercriminals who are trying to hack into a system usually take precautions to remove or hide as many traces of their activity as possible, for example by deleting (parts of) log files, replacing certain system functions by special "hacker versions" which if activated will not reveal the presence of the hacker, and so on. This can make it difficult for a prosecutor to secure reliable evidence of what has happened, in case it is necessary to proceed with criminal charges.
In this project, techniques for ensuring that reliable evidence can be preserved are to be investigated. These will include secure logging, secure system monitoring, and hardening of the system against changes introduced by authorised or unauthorised users. The analysis should consider as many aspects of these techniques as possible, including for example:
Prerequisites: 02230/2345 Computer Security; 02233 Network Security.
The aim of this project is to develop an intrusion detection system which is able to recognise and diagnose patterns of improper activity which are specific to mobile wireless networks. The project will involve a study of the literature on security in mobile wireless networks, an analysis of features of communication which indicate various forms of attack, and the development of a software system which can be used to classify observed combinations of features to identify the nature of the attack (if any) and, where possible, its source. This project builds on a number of previous projects in which neural networks have been used for similar forms of classification in wired networks.
Prerequisites: 02230/02345 Computer Security; 02233 Network Security.
The aim of this project is to further develop an existing initial prototype of a tool to provide this assistance. The main focus of the task involves building up an ontology for concepts which typically appear in descriptions of the threats, assumptions and policies applicable to secure IT systems, and incorporating this into the tool, so as to help the designer to find appropriate SFRs for use in dealing with those threats which become apparent during a given design task. Inspiration for this can be found in an existing ontology for CC concepts developed at IMM.
The new prototype should as a minimum be able to help the designer to produce the PP and derive an ST from this. If time allows, it may be extended to include (parts of) the final step of deriving a concrete design from the ST or to assist with the process of providing assurance that the PP, ST and design are correct.
Prerequisites: 02230/02345 Computer Security; 02263 Formal Aspects of Software Engineering.
The aim of this project is to develop a prototype of a tool to provide assistance with the task of handling the SARs. The task involves two main elements:
Prerequisites: 02230/02345 Computer Security; 02263 Formal Aspects of Software Engineering.
The aim of this project is to investigate this problem, focussing on the area of IT security awareness among elderly people. The project involves reviewing current practice in investigating elderly people's knowledge and understanding of computer security issues, setting up a number of simulated scenarios with which participants in a web-based questionnaire can interact, and which are instrumented to monitor the participants' reactions, and testing out the system on groups of elderly people, many of whom have no technical background in the use of computers.
This project is part of a larger project to investigate IT-security awareness among the general public in Denmark, in which IMM works in collaboration with DK-CERT and DPU.
Prerequisites: 02230/02345 Computer Security.