Research
Computer Systems Security & Intrusion Detection
The primary focus of my research is Computer Systems Security and Intrusion Detection and Prevention
Systems. In the latter part we aim to create effective Intrusion Detection and Prevention System which
are able to detect and protect Network Intrusions effectively and in reasonable time. This is an
important area in Computer Security as made evident by, for example, the recent hacking of Sony PS3,
which involved 24.6 million customer accounts being vulnerable, and the hacking of websites both
including US and Canadian government sites.
Intrusion Detection Systems can be classified by the detection techniques which they use: misuse
detection, anomaly detection, specification-based detection, and model-based detection. Misuse detection
identifies intrusion by well-defined attack patterns which exploit weaknesses in system and application
software. Anomaly detection, refers to intrusions that are significant deviations of established normal
user and system behaviours.
Misuse detection and anomaly detection are popular methods in intrusion detection field. Misuse
detection has already applied on commercial IDSs because of its predictability and high accuracy. In
contrast, anomaly detection has fewer products in the market, but it is considered as a more powerful
method for its theoretical potential on identifying novel attacks.
In our research we have extended Anomaly detection by using Self-organization Feature Maps
(classified as an Artificial Neural Network (ANN)), to identify Intrusions. This is done by training the
system to recognize the ``closeness'' of an attack with attributes (42 of them in the case of the KDD-99
dataset), to a certain class of attack, or if the data is normal. We have obtained encouraging results
and furthered the research by using different ANNs, with a voting system and a novel equation to
determine the vote.
We have also shown the correlation of Intrusion Detection Techniques in Mobile Ad-Hoc Networks to
routing protocols and identified new characteristics and changes that need to be made to achieve a
higher level of security than is currently possible.
Digital Watermarking is another area we have worked on. Digital watermarking is the process of embedding
information into a digital signal which may be used to verify its authenticity or the identity of its
owners, in the same manner as paper bearing a watermark for visible identification. In digital
watermarking, the signal may be audio, pictures, or video. If the signal is copied, then the information
also is carried in the copy. The author of the image is thus able to determine and prove that the image
is his/hers. Of course, this is subject to the watermark in the image being robust, that is resilient to
attacks such as cropping, adding of noise, Xeroxing, etc. We have developed algorithms that are robust
and resilient to most of the attacks, and these have been published in a number of conferences.