Dartmouth Begins Network Security Project

Jul 15, 2008 4:05 PM


         Subscribe in NewsGator Online   Subscribe in Bloglines

A team of Dartmouth researchers is preparing to launch a project that examines its campus wireless computer traffic in an effort to learn how the network is used and how to best maintain its security. The project is called the Dartmouth Internet Security Testbed (DIST).

"Our campus environment is the perfect place for this project because we can examine live network activity at scale and in real-time," says David Kotz, professor of computer science and the principal investigator on the DIST initiative. "We've worked in laboratory settings with controlled parameters; now it's time for a live, real-world test. For organizations that depend on their wireless networks like we do, this research should prove invaluable." Kotz is working closely with Dartmouth's Peter Kiewit Computing Services Department.

DIST will develop and evaluate current sensing methods for monitoring the multiple wireless networks at Dartmouth to gather real-time data. Researchers hope to learn how to quickly discover patterns that may indicate malicious activity and determine the best way to resolve those situations. Kotz explains that the scope and scale of this project is unique within the academic research community, and it will improve network security technology and practices for all Internet users. For example, DIST may help detect unauthorized access points, which can be used to steal users' passwords.

The project is funded by the Department of Homeland Security through Dartmouth's Institute for Security Technology Studies. In addition to developing and testing technology, DIST will serve as a model for how other enterprises can secure their wireless networks.

The researchers carefully designed their studies to protect the privacy of all campus network users. The aim is to preserve the research quality of the data without compromising user privacy. Numerous procedures are in place to collect data in a way that makes it anonymous, where the user is never identified or associated with his or her network activity. The researchers do not examine any of the content of wireless network traffic; they only see the "headers," the information that distinguishes packets of data from a request to connect to the wireless network.

The headers indicate the size and origin of the data (a laptop or access point), but not the type of data or anything about the contents of the communication. The identity of the individual wireless device is replaced by a random identifier. The researchers also record the specific wireless network being used.

"Privacy is paramount in this research effort," Kotz says. "We've ensured that strict processes are in place to monitor the project to protect the privacy of our Wi-Fi users."

David Bucciero, director of technical services for the Peter Kiewit Computing Services Department, chairs Dartmouth's Cyber Security Initiative. "I think the findings coming out of DIST will greatly benefit the Cyber Security Initiative. It's kind of like having a computer security safety net protecting us," he says. The Cyber Security Initiative, a campus-wide computing security effort, works to improve the security of the College's information systems through research interests and practical applications. Bucciero's team has been working closely with Kotz to make sure that DIST and his initiative work in concert.

Want to use this article? Click here for options!
© 2014 Penton Media Inc.

Today's New Product

Product 1 Image

Privaris Biometric Verification Software

In support of the Privaris family of personal identity verification tokens for secure physical and IT access, an updated version of its plusID Manager Version 2.0 software extends the capabilities and convenience to administer and enroll biometric tokens. The software offers multi-client support, import and export functionality, more extensive reporting features and a key server for a more convenient method of securing tokens to the issuing organization.

To read more...


Govt Security

Cover

This month in Access Control

Latest Jobs

Popular Stories

Back to Top