Current Projects |
Vulnerabilities Analysis |
Davis Social Links |
Secure Programming Clinic |
E-Voting Research |
Distribution Grid Security Leveraging µPMU Measurements and SCADA Commands |
NetSage - Network Performance Analysis |
Previous Projects |
Application of Cyber Security Techniques in the Protection of Efficient Cyber-Physical Energy Generation Systems |
Forensic Logging and Auditing |
Balancing Privacy and Analysis in Data Sanitization |
Biology-Inspired Security Techniques |
ICMP Traceback for DDoS |
Policy Analysis and Generation for IPSec/VPN |
Truthsayer |
Mobile Code Security |
E-Commerce Cryptographic Protocols |
Using Untrusted Domains for Computations |
Managing Computer Networks to Respond Rapidly to Threats |
Automated Analysis of Vulnerabilities |
Trust Models in Collaborative Systems |
Anomaly Detection in Database Systems (NSA) |
The Ariel Project (DARPA) |
ITR: A Semantic-Based Approach for Automated Response to Attacks (NSF/ITR) |
ITR: Automatic Consistency Checking for IPSec/VPN Security Policy (NSF/ITR) |
Intrusion Detection Analysis Project (Promia, Inc.) |
Mathematical Modeling of Deception (Sandia) |
Model Based Scenario Intrusion Correlation (NSA) |
MURI Protocol Research (UCSB) |
Property-Based Testing to Verify an Environment (NASA/JPL) |
Intrusion Detection for Mobile Ad Hoc Networks (Telcordia) |
Environment-Aware Security System (NetSquared) |
Verification of Security Run-Time Verification System (NSF/NASA) |
Testing & Benchmarking Methodologies for Future Network Security Mechanisms (NSF/NRT) |
Balancing Privacy and Analysis in Data Sanitization (NSF/TC) |
Security Analysis and Re-engineering of Databases (NSF) |
Sandbox System Call API for Linux |
AWB: Audit Workbench (NSA) |
Authentications in a Distributed Intrusion Detection System (Trident) |
Audit Reduction and Compression (NSA) |
Boeing Response Project (Boeing, DARPA) |
CMAD
IV: Computer Misuse & Anomaly Detection Proceedings of the UC Davis conference held in Monterey, California from November 12-14, 1996 |
Common Intrusion Detection Framework
(CIDF) UC Davis participates extensively in this effort to define a common standard so that Intrusion Detection Systems can work together by sharing data. |
A Compositional Optimum Network Sensor Utilization System (CONSensUS) (DARPA) |
Denial of Service (Microsoft) |
Denial of Service in the Infrastructure (NASA Ames) |
From Generic Policies to Enforcement Rules (NSA) |
Global Guard Project: A Protection Architecture for Survivability of Large-Scale, High-Confidence Information Networks (DARPA) |
Hierarchical Adaptive for Qos Intrusion Tolerance (HACQIT) (Teknowledge Corporation) |
History of Computer Security (University of Maryland) |
Inference Detection in Database Systems (NSA) |
Intel Project (Intel) |
Intrusion Detection and Isolation Protocol / IDIP (DARPA) |
Intrusion
Detection for Large Networks (DARPA) We are studying intrusion detection techniques that scale to very large networks. Our main effort has been a prototype called the Graph-based Intrusion Detection System (GrIDS). |
Misuse Detection (ORD) |
Models for Testing Intrusion Detection Systems (NSA) |
Network Router Auditing (NSA) |
Policy Research Group |
System Health & Intrusion Monitoring (SHIM): A New Approach to Triggering Intrusion Tolerant Mechanisms (Network Associates, Inc.) |
Virus (LLNL) |
Distributed Intrusion Detection System (USAF/LLNL) |
Vulnerabilities (HP, Intel, Net Squared) |
Workshop for Intrusion Detection and Response Data Sharing (SANS Institute) |
Associated Labs |
Networks |
Database and Information Systems Group |
Parallel and Distributed Computing |
Verification |
Politically
Correct Virus: Doesn't refer to itself as a virusinstead, refers
to itself as an "electronic microorganism."
Mark Kaye