A. Project title: Design and Development of an Open-Source Enterprise Network

Similar documents
About the National Academy of Inventors

Innovation and the Global Economy

Expression Of Interest

MORGAN STATE UNIVERSITY PROCEDURES ON PATENTS AND TECHNOLOGY TRANSFER APPROVED BY THE PRESIDENT NOVEMBER 2, 2015

THE AMERICAN INTELLECTUAL PROPERTY LAW ASSOCIATION RECOMMENDATIONS REGARDING QUALIFICATIONS FOR

Section 1: Internet Governance Principles

EuropeAid. Sustainable and Cleaner Production in the Manufacturing Industries of Pakistan (SCI-Pak)

In modern economic and social relations, in the process of material goods production implementing production innovative means, improving the existing

DOC-CAREERS II Project, Final conference Brussels 2012 University-Industry Intellectual property rights: Balancing interests

As a Patent and Trademark Resource Center (PTRC), the Pennsylvania State University Libraries has a mission to support both our students and the

Technology Transfer: Working with Industry at MIT. 10 February 2009 Kenneth A. Goldman Manager, Corporate Relations MIT Industrial Liaison Program

UMEC Technology Transfer Plan

Canada s Intellectual Property (IP) Strategy submission from Polytechnics Canada

Impact Evaluation of the R&D and Innovation Support Programs

1. Recognizing that some of the barriers that impede the diffusion of green technologies include:

Patenting trends among the SAARC nations: comparing the local and international patenting intensity

Session 2: Essential IP Knowledge to Protect your Technology in China. Dr. Martin Seybold Kanzlei Dr. Seybold, Beijing

Introduction to SECURE Program

MSc(CompSc) List of courses offered in

Internet 2020: The Next Billion Users

How Explainability is Driving the Future of Artificial Intelligence. A Kyndi White Paper

UNIVERSITIES AND TECHNOLOGY TRANSFER PATENT ATTORNEYS TRADE MARK ATTORNEYS

GENEVA COMMITTEE ON DEVELOPMENT AND INTELLECTUAL PROPERTY (CDIP) Fifth Session Geneva, April 26 to 30, 2010

Asking Questions on Knowledge Exchange and Exploitation in the Business R&D and Innovation Survey

Science and Innovation Park in Valencia

Graduate attributes for a field of study *

INTELLECTUAL PROPERTY OVERVIEW. Patrícia Lima

Service Science: A Key Driver of 21st Century Prosperity

PhD Student Mentoring Committee Department of Electrical and Computer Engineering Rutgers, The State University of New Jersey

PENN CENTER FOR INNOVATION PROGRESS AND PLANS

REPORT DOCUMENTATION PAGE

Game Theoretic Problems in Network Economics and Mechanism Design Solutions

Earth Cube Technical Solution Paper the Open Science Grid Example Miron Livny 1, Brooklin Gore 1 and Terry Millar 2

Towards Enhancement of Communication Systems, Networks and Applications for Smart Environment

Princeton University HONORS FACULTY MEMBERS RECEIVING EMERITUS STATUS

THE UNITED STATES PATENT AND TRADEMARK OFFICE S PARTNERSHIP WITH THE NATIONAL INVENTORS HALL OF FAME

HP Laboratories. US Labor Rates for Directed Research Activities. Researcher Qualifications and Descriptions. HP Labs US Labor Rates

ECU Research Commercialisation

Intellectual Property

WORKSHOP ON BASIC RESEARCH: POLICY RELEVANT DEFINITIONS AND MEASUREMENT ISSUES PAPER. Holmenkollen Park Hotel, Oslo, Norway October 2001

UCF Patents, Trademarks and Trade Secrets. (1) General. (a) This regulation is applicable to all University Personnel (as defined in section

TECHNICAL UNIVERSITY OF CLUJ NAPOCA FACULTY OF MACHINE BUILDING. Department for Fabrication Engineering. Eng. Bogdan MOCAN.

Computer Science & High Tech

Science and mathematics

Great Minds. Internship Program IBM Research - China

Engineering Autonomy

Co-funded by the I Erasmus+ Programme of the European Union

RESOURCES TO INSPIRE YOUNG PEOPLE ABOUT CAREERS IN DIGITAL

Facilitating Technology Transfer and Management of IP Assets:

Tesca Fitzgerald. Graduate Research Assistant Aug

Center for Basic Algorithms Research Copenhagen

Maximizing Innovation Funding for Technology Development. MNP SR&ED Team. Presented by: Date:

Dynamic Cities and Creative Clusters

ADVANCING KNOWLEDGE. FOR CANADA S FUTURE Enabling excellence, building partnerships, connecting research to canadians SSHRC S STRATEGIC PLAN TO 2020

SDN Architecture 1.0 Overview. November, 2014

Academic Technology Licensing & the America Invents Act

CITATION OF PRESIDENT S SCIENCE AND TECHNOLOGY MEDAL 2012 WINNER

EL PASO COMMUNITY COLLEGE PROCEDURE

Low carbon technology challenges for major developing countries

Call for Entries 2017

Breaking RSA semiprimes

5G Wireless Researcher Acces lab

CHEMISTRY AND PHARMACEUTICALS PATENT ATTORNEYS TRADE MARK ATTORNEYS

5G Wireless Researcher Acces lab

Intellectual Property Ownership and Disposition Policy

Policy Contents. Policy Information. Purpose and Summary. Scope. Published on Policies and Procedures (

DOCTORAL THESIS (Summary)

Multi-Mode Ground Reconfigurable MIMO Antenna System

G9 - Engineering Council AHEP Competencies for IEng and CEng

Towards the definition of a Science Base for Enterprise Interoperability: A European Perspective

Kyiv National University of Trade and Economics Faculty of Trade and Marketing INFORMATION PACKAGE

My name is Carsten Wald, I am freelancer in software developement and I would like to answer to your questions.

Impact and Innovation in H2020 Proposals and projects

Engineering Change Lab (Eng Lab) UNLOCKING THE POTENTIAL OF THE ENGINEERING PROFESSION IN CANADA SYSTEMICALLY, EXPERIMENTALLY & COLLABORATIVELY

Information and Communication Technology

Software and service for advanced Intellectual Property analysis

International Partnership for Nuclear Disarmament Verification Phase II

Canada s National Design Network. Community Research Innovation Opportunity

LEADING DIGITAL TRANSFORMATION AND INNOVATION. Program by Hasso Plattner Institute and the Stanford Center for Professional Development

Initial communication and dissemination plan. Elias Alevizos, Alexander Artikis, George Giannakopoulos. Scalable Data Analytics Scalable Algorithms,

SUSTAINABILITY MATERIALITY OVERVIEW

Analogy Engine. November Jay Ulfelder. Mark Pipes. Quantitative Geo-Analyst

Serco Awarded $95 Million Patent Classi cation Contract with the U.S. Patent and Trademark Of ce

Introduction to the SMEs Division of WIPO

National Academy of Inventors Auburn University Chapter Newsletter

Carbon Management Innovation Issues in Canadian Universities. Dr. Robin Hughes Research Engineer CanmetENERGY

PRINCIPLES AND CRITERIA FOR THE EVALUATION OF SCIENTIFIC ORGANISATIONS IN THE REPUBLIC OF CROATIA

Vistas International Internship Program

Transfer of technology in practice. Zofia Gródek-Szostak 18/04/2013r.

Current research: Effective structures for social entrepreneurs offering distributed solar products in developing nations.

Technology Commercialization Primer: Understanding the Basics. Leza Besemann

Evolving Systems Engineering as a Field within Engineering Systems

An Analysis Of Patent Comprehensive Of Competitors On Electronic Map & Street View

POLICY ON INVENTIONS AND SOFTWARE

Mission Agency Perspective on Assessing Research Value and Impact

Administrative Staff Questionnaire. Overall technical direction. Management and administration of center. Management of individual research projects

FINAL ACTIVITY AND MANAGEMENT REPORT

MARINE STUDIES (FISHERIES RESOURCE MANAGEMENT) MASTER S DEGREE (ONLINE)

Robin Mansell and Brian S. Collins Introduction: Trust and crime in information societies

Project Review: P1 (2)

Transcription:

Project Completion Report A. Project title: Design and Development of an Open-Source Enterprise Network Security Solution B. Project Summary: Objectives The primary objective of this project was to indigenously design and develop a state-ofthe-art enterprise network security solution in Pakistan. This solution was developed and its research was published in the top security conferences and journals of the world. A US patent was also filed to protect the intellectual property created during this project. The security software was tested on academic (online) and industrial (offline) networks in Pakistan. In particular, the developed security algorithms were tested in NUST and FAST in online environments. We also used offline datasets from Nayatel and PTCL to test our algorithms. After development and testing, the proposed security solution was made publicly available under an open-source license. Team Structure The project team comprised the PI and the Co-PI in supervisory roles. The main research work was carried out by two Software Engineers and one Software Quality Assurance Engineer. They were assisted in this research by undergraduate Research Assistants. In addition to the open-source release, this project has resulted in 3 undergraduate final year projects and two MS theses. Significant Achievements of the Project Development of some of the most efficient and advanced network anomaly detection algorithms. Collection of a comprehensive attack dataset that is being used by researchers across the world. Open-Source software release which is being used by developers and industry professionals around the world.

Deployment of the solution in NUST and testing on offline datasets from PTCL and Nayatel. A patent filed with the US Patents and Trademarks Office (USPTO). Publication of five conference papers and three journal papers in the following venues: o First-ever indigenous publication from Pakistan in the prestigious ACM Conference on Computer and Communication Security (CCS). (ACM CCS is ranked as the top conference in the Security & Privacy area for the last 5 years by Microsoft Academic Search [http://academic.research.microsoft.com/].) o First-ever papers (one in 2008 and one in 2009) in the prestigious International Symposium on Recent Advances in Intrusion Detection (RAID). o The remaining papers were also published in top ranking conferences and journals: ACM Sigcomm CCR, Springer Journal in Computer Virology, and IEEE ICC. Two MS theses and three undergraduate Final Year Projects were conducted under this project. Graduate researcher, Ayesha Binte Ashfaq, won the National Youth Award for the year 2008 in the "Computer Science and Information Technology" category. Graduate researcher, Fida Hussain, working on the project won the PTA Award for Best MS Thesis for the year 2009. Undergraduate researcher, Summaira Zafar, working on this project won the Rector s Gold Medal for Best FYP for the year 2009. (This is one of the highest academic honors for an undergraduate NUST student.). Research Approach Please refer to the theoretical deductions and summary document for details of our research approach. In short, we following an end-to-end anomaly detection design strategy in which all steps of traffic analysis and processing was carefully redesigned. We use strong mathematical formulations to solve problems at each step and the resultant security algorithms were rigorously tested using online deployments and offline traces. The consequent anomaly detection system architecture developed in this project is shown in the figure below. Details of the research and development challenges encountered in the project and our proposed solutions can be found in our research papers.

C. Objectives and achievements Original Project Objectives (Please state the specific project objectives as described in Section II of the Application Form) Objective 1: The primary objective of this project is to indigenously design and develop a state-of-the-art enterprise network security solution in Pakistan. Objective 2: The security software should tested on academic (online) and industrial (offline) networks in Pakistan. Objective 3: The proposed security solution should be released publicly under an opensource license. Objective 4: Human resources should be trained in this cutting-edge field. Objectives Achieved (Please state the extent to which the project objectives were achieved) Objective 1: The system developed in this project was developed and its research was published in the top security conferences and journals of the world. A US patent was also filed to protect the intellectual property created during this project. Objective 2: The developed security algorithms were tested in NUST and FAST in online environments. We also used offline datasets from Nayatel and PTCL to test our algorithms. Objective 3: After development and testing, the proposed security solution was made publicly available under an open-source license. Objective 4: In addition to software developers working on a cutting-edge problem, two MS theses and three undergraduate Final Year Projects were conducted under this effort. Objectives not Achieved (Please identify the objectives that were not achieved and give reasons) All objectives were achieved.

D. Technology Transfer/Commercialization Approach This is the biggest challenge for our team right now. We have released our code base and data sets in open-source and it is being used extensively by the research community. However, we have not been very successful in targeting industrial partners for commercialization of the project research. Nevertheless, some success in commercialization have been achieved which are enumerated below: 1. Instead of focusing on security threats, we are repositioning our algorithms to detect a more pertinent commercial problem: Deep Packet Inspection (DPI). In this regard, Tellabs (a public US company) has given a contract to the project team in which we have to adapt our security algorithms to detect unwanted traffic in real networks. 2. We have filed a patent in the US Patents and Trademarks Office (USPTO) to protect the innovations undertaken in this project. 3. We have contacted many security companies to license some of this technology in their existing product lines. We have not been very successful with this business model because companies lack the trust to incorporate security technologies developed in Pakistan in their running production lines.

E. Benefits of the Project Outputs of the project and potential beneficiaries (Please describe as specifically as possible the outputs of the project and the assessment of their benefits to the users) Outcome 1: Design and prototype development of a novel end-to-end anomaly detection system that solves fundamental problems of existing security solutions. The research community is already benefitting from this project as our datasets and system code is being used extensively by researchers around the world. We also believe that commercial companies can benefit from the technology developed in this project, but so far we have not had much success in convincing commercial to deploy our algorithms in their systems. Outcome 2: The research conducted in this project has been recognized by the worldwide security community. We have published papers in the most competitive conferences and journals where no paper from Pakistan has ever been accepted before. Pakistani students, developers and researchers have benefitted a lot from working on this cutting-edge technology. Most of the students working on this project were offered fully-funded PhDs by high-ranking USA universities. Other students got highly paid jobs in the industry. Two national and one NUST award were also won by this project s team.

Organizational Outcomes Organizational Outcome 1: NUST and Pakistan s credibility has increased considerably in the security research community. Organizational Outcome 2: NUST has won sponsored research projects from Silicon Valley companies by showcasing the results of this research. National Impacts (Please identify the Sectoral/ National benefits arising from the project, if known at this point in time) Impact 1: Due in part to this project and other security project funded by ICTRDF, Pakistan has emerged as a strong contributor in the worldwide security research community. Impact 2: A number of resources have been trained in this cutting-edge field. Some of these resources are now working in public sector organizations to implement strong security systems to protect critical Pakistani networks. Other resources are working in the industry and are producing high-quality security products.