• Increase font size
  • Default font size
  • Decrease font size
News

NSF Awards $450k for Data Leak Prevention

E-mail Print PDF

The National Science Foundation has awarded Professor Feamster $450k over three years to develop techniques to control and prevent data leaks and the spread of malware in enterprise networks.

In Deloitte's recent Global Security Survey, nearly half of the companies surveyed reported some internal security breach; of those, about a third of breaches resulted from viruses or malware, and another third resulted from insider fraud.  The Pedigree project aims to develop mechanisms to control and prevent these data breaches in enterprise networks.  This growing problem begs the need for better techniques for controlling information flow in the network itself.

We are addressing several research challenges. First, we are exploring the appropriate granularity for tainting that preserves semantics without imposing unacceptable memory and performance overhead. Second, we are designing the system to minimize performance overhead on applications. Third, we are exploring translation mechanisms between host-based taints and network-based taints, so that taints carried in network traffic convey meaningful semantics without imposing prohibitive network overhead. The research will result in an information tracking and control system that is deployed in experimental settings (e.g., the Georgia Tech campus network) using the existing and forthcoming programmable switch implementations.

Our writeup of the system remonstration from SIGCOMM 2009 provides more details.  Details on the aware are available at the NSF Web site.

 

 

SIGCOMM Demos in Barcelona

E-mail Print PDF

The lab had a great showing at this year's SIGCOMM 2009 conference in Barcelona, with three demonstrations:

  • Transit Portal: Bringing Connectivity to the Cloud.  Student: Valas Valancius
  • Securing Enterprise Networks with Traffic Tainting. Students: Anirudh Ramachandran, Yogesh Mundada, Mukarram bin Tariq
  • Network and End-System Support for Transparent Use of Multiple Paths. Student: Murtaza Motiwala.

Below is a photo of Yogesh Mundada giving the demo of our Pedigree system, which performs network-level enforcement of information-flow policies in an enterprise network.

 

Last Updated on Tuesday, 24 November 2009 04:19
 

SNARE on Slashdot, Tech Review

E-mail Print PDF

Our paper on network-level spam filtering, SNARE, appeared in Tech Review, Slashdot, and MetaFilter.  Spam-filtering techniques from SNARE and SpamTracker have been adopted by various spam filtering vendors and Web mail providers.  Below, Shuang Hao presents SNARE at USENIX Security Symposium in Montreal.

Last Updated on Tuesday, 24 November 2009 04:31
 

NSF Security Driven Architectures Workshop

E-mail Print PDF

Nick Feamster co-organized the NSF Security Driven Architectures workshop with NSF program managers Karl Levitt and Lenore Zuck.  The workshop drew about 30 participants from a variety of areas in computer science to discuss next-generation architectures focused around improving system and network security.  Slides from this workshop are available upon request; a writeup is forthcoming.

 

Cybersecurity Data "Wish List"

E-mail Print PDF

Prof. Feamster helped organize a panel and assemble a document for providing a "data wish list" for security research for the Office of Science and Technology Policy. That document is available here.

Last Updated on Tuesday, 24 November 2009 03:56
 


Page 3 of 3