YIP research leads to new security algorithms

Oct 22, 2010
Young Investigator Research Program computer scientists are making large strides in developing new tools and techniques to reverse-engineer data-hiding algorithms from watermark detectors, which once commercialized and deployed, will improve the security of the GlobalInformation Grid of the Air Force computer networks. Credit: Graphic by Craver, Binghamton University

The Air Force Office of Scientific Research's Young Investigator Research Program is enabling new scientists and engineers with exceptional ability to do creative basic research, enhance their career development and develop tools and techniques.

The current researchers are using the program with algorithms to improve the security of the Global information Grid of the Air Force computer networks.

"The YIP program is also significant because it allows program managers to have even more freedom in selecting researchers like AFOSR-supported scientists, Dr. Scott Craver of Binghamton University and Dr. Yan Chen of Northwestern University," said Dr. Robert Herklotz, AFOSR program manager.

Craver and Chen worked on two separate projects involving detection and evasion algorithms that when implemented will prove to be cutting-edge.

"The new technology will not only accurately block the known existing attacks, but will also defeat future possible attacks on networks, including wireless ones," said Dr. Yan Chen who accomplished his research goals by designing state-of-the-art algorithms, implementing them in prototype and evaluating them thoroughly. He will complete his YIP grant in November 2010.

Craver and his researchers who recently completed their YIP grant already, investigated reverse-engineering, detection and detection evasion algorithms.

"Our videoconferencing work requires that we tamper with existing , a task that involves programming in multiple languages on multiple levels," said Craver. "On top of that we had to author entertaining computer animations for use as special effects and for our self-destructing project, we amended video signals."

Rather than waiting for attackers to define their method of defense, the researchers took a proactive approach. They searched and then found potential vulnerabilities in the emerging wireless network protocols and ultimately devised the cutting-edge algorithms.

"Our project generated the first network-based intrusion detection and prevention system that is both highly accurate and fast, up to tens of gigabits per second," said Chen.

"There are many security problems in which one party attempts to detect unauthorized behavior by another party; in response an attacker tries to find strategies for evading a detector by adapting to its ," he said. "Our primary area of focus is the detection of a secret watermark concealed in an image or video clip."

Craver and his co-researchers discovered their largest challenge is the lack of a strong mathematical foundation for detection and evasion algorithms.

However, under the three year long YIP , they have been working to put adversarial detection challenges on a strong mathematical foundation that will allow them to be confident about the security of future detection algorithms.

"Our vision is to significantly improve the current network defense technology, not only against the existing known attacks, but also for unknown attacks, while still being able to match the high-speed network environment," said Chen.

Explore further: Coping with floods—of water and data

Provided by Air Force Office of Scientific Research

not rated yet
add to favorites email to friend print save as pdf

Related Stories

Self-learning security system for computer networks

Jul 09, 2009

Cyber attacks on computer networks are becoming increasingly commonplace. To counter the threat, they are protected by so-called network intrusion detection systems. But these fail to identify some attacks, or do not spot ...

Cyber criminals cloak their tracks

Feb 13, 2008

The 2007 X-Force Security report from IBM finds a disturbing rise in the sophistication of attacks by criminals on Web browsers worldwide. According to IBM, by attacking the browsers of computer users, cyber criminals are ...

Air Force grant to tighten online encryption

Dec 14, 2009

(PhysOrg.com) -- Computer scientist Rafael Pass is seeking new approaches to cryptographic security with a $600,000, five-year grant from the Air Force Office of Scientific Research.

Recommended for you

Coping with floods—of water and data

Dec 19, 2014

Halloween 2013 brought real terror to an Austin, Texas, neighborhood, when a flash flood killed four residents and damaged roughly 1,200 homes. Following torrential rains, Onion Creek swept over its banks and inundated the ...

Cloud computing helps make sense of cloud forests

Dec 17, 2014

The forests that surround Campos do Jordao are among the foggiest places on Earth. With a canopy shrouded in mist much of time, these are the renowned cloud forests of the Brazilian state of São Paulo. It is here that researchers ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.