Contact
|
Course Codes:
|
|
Research Project 1 |
53841REP6Y
|
Research Project 2 |
53842REP6Y |
|
TimeLine
|
|
RP1 (January):
- Wednesday Sept 16, 10h00-11h30: Introduction to the Research Projects.
- Wednesday Dec 2, 13h00-16h00: Detailed discussion on selections for RP1.
- Monday Jan 4th - Friday Jan 29th 2021: Research Project 1.
- Friday Jan 8th, 24h00: (updated) research plan due.
- Monday Feb 1, 11h00-16h00: Presentations RP1 - online.
- Tuesday Feb 2, 10h00 - 15h00: Presentations RP1 - online.
- Sunday Feb 7, 24h00: RP - reports due
|
RP2 (June):
- Wednesday May 12,13h00-16h00, Detailed discussion on selections for RP2.
- Monday May 31th - Friday Jun 25: Research Project 2.
- Friday Jun 4th, 24h00: (updated) research plan due.
- Monday May 14, 16h00, discussion on progress (voluntarily)
- Tuesday June 29, 10h00-17h00: presentations.
- Monday Jul 5, 24h00: RP - reports due.
|
ProjectsHere is a list of student projects. New ones added at the end. Old and unavailable rp's will be removed including the number, hence the gaps. Remaining rp's carry over to next year. They can be found here. In a futile attempt to prevent spam "@" is replaced by "=>" in the table. Color of cell background:
Project available |
Presentation received. |
Confidentiality was requested. |
Currently chosen project. |
Report received. |
Blocked, not available. |
Project plan received. |
Completed project. |
Report but no presentation |
Outside normal rp timeframe |
project will be done in next block
|
|
|
|
|
title
summary |
supervisor contact
students
|
R
P
|
1
/
2 |
6 |
Designing structured metadata for CVE reports.Vulnerability
reports such as MITRE's CVE are currently free format text, without
much structure in them. This makes it hard to machine process reports
and automatically extract useful information and combine it with other
information sources. With tens of thousands of such reports published
each year, it is increasingly hard to keep a holistic overview and see
patterns. With our open source Binary Analysis Tool we aim to correlate
data with firmware databases.
Your task is to analyse how we can use the information
from these reports, what metadata is relevant and propose a useful
metadata format for CVE reports. In your research you make an inventory
of tools that can be used to convert existing CVE reports with minimal
effort.
Armijn Hemel - Tjaldur Software Governance Solutions
|
Armijn Hemel <armijn=>tjaldur.nl>
Bart van Dongen <bdongen=>os3.nl>
|
R
P
|
1
|
10 |
Defeating the Fakes: Vocal Fake Detection using Discrete Fourier Transform in Neural Networks.The detection of manipulation of broadcasting videostreams with facial morphing on the internet. Examples are provided from https://dl.acm.org/citation.cfm?id=2818122 and other on line sources.
|
Zeno Geradts <zeno=>holmes.nl>
Tina Tami <Tina.Tami=>os3.nl>
Lars Tijsmans <lars.tijsmans=>os3.nl>
|
R
P
|
2
|
14 |
Using a verifiable and decentralized ledger as a basis for trusting hospital endpoints.Currently,
the Whitebox provides a means for doctors (General Practitioner GPs) to
establish static trusted connections with parties they know personally.
These connections (essentially, authenticated TLS connections with
known, validated keys), once established, can subsequently be used by
the GP to authorize the party in question to access particular patient
information. Examples are static connections to the GP post which takes
care of evening/night and weekend shifts, or to a specific pharmacist.
In this model, trust management is intuïtive and direct. However, with
dynamic authorizations established by patients (see general description
above), a question comes up on whether the underlying (trust)
connections between the GP practice (i.e., the Whitebox) and the
authorized organization (e.g,. hospital or pharmacist) may be re-usable
as a 'trusted' connection by the GP in the future.
The basis question is:
- what is the degree of trust a doctor can place
in (trust) relations that are established by this doctor's patients,
when they authorize another healthcare professional?
More in general:
- what degree of trust that can be placed in
relations/connections established by a patient, also in view of possible
theft of authorization tokens held by patients?
- What kind of validation methods can exist for a
GP to increase or validate a given trust relation implied by an
authorization action of a patient?
Perhaps the problem can be raised to a higher
level also: can (public) auditing mechanisms -- for example, using block
chains -- be used to help establish and validate trust in organizations
(technically: keys of such organizations), in systems that implement
decentralized trust-base transactions, like the Whitebox system does? In
this project, the student(s) may either implement part of a solution or
design, or model the behavior of a system inspired by the decentralized
authorization model of the Whitebox. As an example: reputation based
trust management based on decentralized authorization actions by
patients of multiple doctors may be an effective way to establish trust
in organization keys, over time. Modeling trust networks may be an
interesting contribution to understanding the problem at hand, and could
thus be an interesting student project in this context.
NB: this project is a rather advanced/involved design
and/or modelling project. Students should be confident on their ability
to understand and design/model a complex system in the relatively short
timeframe provided by an RP2 project -- this project is not for the
faint of heart. Once completed, an excellent implementation or
evaluation may become the basis for a research paper.
See also (in Dutch): https://whiteboxsystems.nl/sne-projecten/#project-2-ontwerp-van-een-decentraal-vertrouwensmodel
General introductionWhitebox Systems is a UvA
spin-off company working on a decentralized system for health
information exchange. Security and privacy protection are key concerns
for the products and standards provided by the company. The main product
is the Whitebox, a system owned by doctors (GPs) that is used by the GP
to authorize other healthcare professionals so that they - and only
they - can retrieve information about a patient when needed. Any data
transfer is protected end-to-end; central components and central trust
are avoided as much as possible. The system will use a published source
model, meaning that although we do not give away copyright, the code can
be inspected and validated externally.
The Whitebox is currently transitioning from an
authorization model that started with doctor-initiated static
connections/authorizations, to a model that includes patient-initiated
authorizations. Essentially, patients can use an authorization code (a
kind of token) that is generated by the Whitebox, to authorize a
healthcare professional at any point of care (e.g., a pharmacist or a
hospital). Such a code may become part of a referral letter or a
prescription. This transition gives rise to a number of interesting
questions, and thus to possible research projects related to the
Whitebox design, implementation and use. Two of these projects are
described below. If you are interested in these project or have
questions about other possibilities, please contact
<guido=>whiteboxsystems.nl>.
For a more in-depth description of the projects below (in Dutch), please see https://whiteboxsystems.nl/sne-projecten/
|
Guido van 't Noordende <guido=>whiteboxsystems.nl>
Matthijs Bartelink <Matthijs.Bartelink=>os3.nl>
|
R
P
|
1
|
27 |
Detection of false frame attacks in video systems.A
smart attack was investigated which can be performed at the time of
recording video only against smart VSS (Video Surveillance System). The
main feature of smart VSS is its ability to capture a scene immediately
on the detection of particular activity or object. This new design has
been made target by attackers who trigger the injection of false frames
(false frame injection attack).
The RQ is if how we can detect that this happened afterwards if challenged in court.
Reference:
D. Nagothu, J. Schwell, Y. Chen, E. Blasch, S. Zhu, A
study on smart online frame forging attacks against video surveillance
system, in: Sensors and Systems for Space Applications XII, Vol. 11017,
International Society for Optics and Photonics, 2019, p. 110170 (2019)
|
Zeno Geradts <zeno=>holmes.nl>
Joris Janssen <Joris.Janssen=>os3.nl>
|
R
P
|
1
|
31 |
Profiling the abuse of exposed secrets in public repositories.Appropriate
secret management during software development is important as such
secrets are often high privileged accounts, private keys or tokens which
can grant access to the system being developed or any of its
dependencies. Systems here could entail virtual machines or other
software/infrastructure/platform services exposing a service for remote
management. To combat mismanagement of secrets during development time,
software projects such as HachiCorp Vault or CyberArk Conjure are
introduced to provide a structured solution to this problem and to
ensure secrets are not exposed by removing them from the source code.
Unfortunately, secrets are still frequently committed
to software repositories which has the effect of accidentally ending up
in either packages being released or in publicly accessible
repositories, such as on Github. The fact that these secrets are then
easily accessed (and potentially abused) in an automated fashion has
been recently demonstrated by POC projects like shhgit [1].
This research would entail the study and profiling of
the behavior of the abuser of such secrets by first setting up a
monitoring environment and a restricted execution environment before
intentionally leaking secrets online through different channels.
Especially, the research focuses on answering the following questions:
- Can abuse as a result of leaked credentials be profiled?
- Can profiles be used to predict abuser behavior?
- Are there different abusers / patterns / motives for different types of leaked credentials?
- Are there different abusers / patterns / motives for different sources of leaked credentials?
- Can profiles be used to attribute attacks to different attacker groups?
Prior experience with security monitoring and or
cloud environments such as AWS / Azure is recommended in order to timely
scope the research to a more feasible proposal.
[1] https://github.com/eth0izzle/shhgit
|
Fons Mijnen <fmijnen=>deloitte.nl>
Mick Cox <mcox=>deloitte.nl>
Maurice Mouw <Maurice.Mouw=>os3.nl>
|
R
P
|
1
|
33 |
Cloud Access Security Brokers (CASBs); Characterization of the CASB market and its alignment with corporate expectations.CASB
are often referred to as the new firewall of the Cloud era; they
provide a middleman layer between a company network and a set of web
services. However, many companies have been disappointed by their
capabilities after implementation.
The objective of this research is to provide an
detailed comparison of the current capabilities of the market leaders
against the capabilities expected by corporate IT executives. You will
have to address the following point:
- Give an accurate definition of the CASB technology
- Identify the risks related to Shadow IT and potential mitigation for each of them
- List the capabilities of the Leaders and
Visionaries in the Gartner Quadrant and verify they address the risks
related to Shadow IT
- Give your conclusion on the maturity of this market
NB: The challenge of this subject is to find
reliable information. You can start with contacting providers’ sales
department and request a demonstration, crossing the references of
research publications or interacting on cybersecurity web forums.
Reference: https://www.bsigroup.com/globalassets/localfiles/en-ie/csir/resources/whitepaper/1810-magic_quadrant_for_casb.pdf
|
Ruud Couwenberg <Couwenberg.Ruud=>kpmg.nl>
Anand Groenewegen <Anand.Groenewegen=>os3.nl>
Marius Brouwer <mbrouwer=>os3.nl>
|
R
P
|
2
|
34 |
Analysis of a rarely implemented security feature: signing container images with a Notary server.Notary
is Docker's platform to provide trusted delivery of content by signing
images that are published. A content publisher can then provide the
corresponding signing keys that allow users to verify that content when
it is consumed. Signing Docker images is considered as a best security
practice, but is little implemented in practice.
The goal of this project is to provide guidelines for safe service implementation. A starting point could be:
- Get familiar with the service Architecture and Threat Model [1]
- Deploy a production like service [2]
- Test the compromise scenarios from the Threat Model
- Conclude and release a secure production-ready manual and docker-compose template
Reference:
-
https://docs.docker.com/notary/service_architecture/
-
https://docs.docker.com/notary/running_a_service/
Demo from the presentation: https://www.youtube.com/watch?v=jcgkMYyzeYY
|
Aristide Bouix <Bouix.Aristide=>kpmg.nl>
Tim Dijkhuizen <Dijkhuizen.Tim=>kpmg.nl>
Ruben Koeze <Koeze.Ruben=>kpmg.nl>
Mohanad Elamin <melamin=>os3.nl>
Rio Kierkels <Rio.Kierkels=>os3.nl>
|
R
P
|
1
|
36 |
Transparent malicious traffic detection and mitigation using the Nvidia BlueField DPU.Developing
a transparent high-speed Intrusion detection and Firewall/ACL mechanism
(a plus would be if it can be based on AI/Machine learning algorithms).
We have some experimental Mellanox Networking technology that needs to be used in this RP.
The goal of this project is figure out how to build a
transparent automated IDS and Firewall/ACL mechanism that can handle
large amounts of traffic (100Gbit/s or more).
Some starting points are:
- Get to know things like OVS, DPDK and VPP
- Test different technologies for high speed IDS
- Test different technologies for high speed Firewalling/ACL's and offloading into hardware (Mellanox Based)
- Figure out a way how to use AI/Machine learning algorithms to speed up the process.
|
Cedric Both <cedric=>datadigest.nl>
Jelle Ermerins <jermerins=>os3.nl>
Ward Bakker <wbakker@os3.nl>
|
R
P
|
2
|
37 |
DPU implementation of a scalable and transparent security solution for numerous VPN connections.We
would like to figure out a scalable security solution with IDS,
antivirus and other mechanisms on monitoring incoming and outgoing
traffic of different VPN connections. We have VPN servers running based
on Open Source software (e.g. OpenVPN and IPSec) with lots of users and
troughput and we would like to have a automated way in transparently
monitoring all user traffic, detection of anomalies when a user for
example access a malicious website or downloaded something that they
shouldn't have and per user reporting.
The goal of this project is to give security
information back to the user that is using the VPN connection to know if
the data that is going over the VPN connection is "Safe and Clean".
Some starting points of this RP are:
- Research how VPN traffic flows can be scanned based on individual users
- Test different technologies for high traffic and high user IDS/antivirus scanning etc.
- Figure out what the most secure way is in giving back the security information to each user.
|
Cedric Both <cedric=>datadigest.nl>
Ilyas Rahimi <irahimi=>os3.nl>
Mounir Kirafi <mkirafi=>os3.nl>
|
R
P
|
1
|
41 |
Real time asset inventory in ICS.Research
in Industrial Control Systems: We know how to do passive asset
inventory within ICS and can create an "as-is" network diagram.
- But how do you keep it updated while new assets are being added to the network?
ICS is more static than IT environment, but a real time asset discovery tooling could be very interesting in some cases.
|
Michel van Veen <mvanveen=>deloitte.nl>
Pavlos Lontorfos <plontorfos=>deloitte.nl>
Artemis Mytilinaios <amytilinaios=>os3.nl>
|
R
P
|
1
|
42 |
Improving availability in Industrial Control Systems using Software-Defined Networking.Research in Industrial Control Systems: Splitting the automation data plane from the network management plane,
- Is it possible in ICS?
- What are the limitations?
- What are the benefits?
|
Dominika Rusek <DRusek=>deloitte.nl>
Pavlos Lontorfos <plontorfos=>deloitte.nl>
Marios Andreou <Marios.Andreou=>os3.nl>
Joris Jonkers Both <Joris.JonkersBoth=>os3.nl>
|
R
P
|
2
|
44 |
Involuntary browser based torrenting (WebRTC).WebRTC research: WebRTC allows for browser-based P2P torrenting.
- Can this function be misused to let visitors of webpages involuntarily participate in P2P networks?
- For example to share illegal or protected media?
- If so, is this an already established and (widely) used tactic?
Possible addition can also be a look into how such attacks be performed and a Proof-of-Concept.
|
Cedric van Bockhaven <CvanBockhaven=>deloitte.nl>
Jan Freudenreich <jfreudenreich=>deloitte.nl>
Alexander Bode <alexander.bode=>os3.nl>
|
R
P
|
2
|
54 |
Hunting for malicious infrastructure using big data.Malicious
actors want to keep their command & control infrastructure away
from prying eyes. Fake error messages, web redirects or dropped
connections are some of the signs that something fishy is going on. In
this research project students develop a framework to do anomaly
detection on HTTP responses. Digging through gigabytes of data to find
the malicious infrastructure that doesn't want to be found.
Students can use the scan data provided Rapid7. These
are JSON-files containing the raw bytes response to an IPv4 wide scan
for a "HTTP GET /"-command on specific ports. Students need to parse
these JSON files and be able to query them (maybe use the ELK-stack?).
Considering the size of the dataset any experience with Elasticsearch
(or similar) solutions is advised.
There is room for another project using the SSL
certificates from Rapid7 and/or certificate transparency log. Ideas are
welcome.
|
Jop van der Lelie <Jop.vanderLelie=>ncsc.nl>
Daniel Sierat <Daniel.Sierat=>ncsc.nl>
Shadi Alhakimi <shadi.alhakimi=>os3.nl>
Freek Bax <freek.bax=>os3.nl>
|
R
P
|
1
|
56 |
An exploration of the suitability of Fawkes for practical applications.The
last decade has seen the rise of new image recognition technologies
that, combined with the rise of IoT and the miniaturization of digital
cameras, potentially endanger our traditional notion of personal
privacy. In this context, a team of researchers from the SAND laboratory
at the University of Chicago released a python tool called Fawkes,
intending to disrupt how facial recognition algorithms relate between
multiple images.
Limiting this technology's use to only a few
tech-savvy individuals would not impact the current trend. Also, it is
crucial to make sure that the technology work and can be deployed at
scale. The goal of this project is to pave the way to broader adoption
of such technologies on online uploading platforms. A proposed
scientific demarche could be:
- Verify a few results from the research paper, to confirm the code work as intended
- Build a Proof of Concept photo website where uploaded face pictures would be cloaked on-the-fly using Fawkes
Optimize the configuration of the cloaking feature to get a seamless experience or proposed architectural workarounds
Reference:
Demo shown during presentation: https://www.youtube.com/watch?v=omG-5dqeTVA
|
Aristide Bouix <Bouix.Aristide=>kpmg.nl>
Huub van Wieren <vanwieren.huub=>kpmg.nl>
Simon Carton <Simon.Carton=>os3.nl>
Danny Janssen <Danny.Janssen=>os3.nl>
|
R
P
|
1
|
57 |
Cloud Certificate Authorities; The security considerations of moving your Public Key Infrastructure to the cloud.
Certification
authorities (CA) provide the backbone of trust for people, systems
applications etc. Setting up an internal CA can be a complex endeavor
that many organization struggle with. A recent development in this field
is that all large cloud providers are now offering CA functionality for
their clients.
This research will focus on what it takes to setup a
cloud CA and how it impacts the security posture of the organization. As
much as time permits, they students will design and implement a cloud
CA in our sandbox environment.
|
Itan Barmes <ibarmes=>deloitte.nl>
Anand Groenewegen <agroenewegen=>os3.nl>
Maurits Maas <Maurits.Maas=>os3.nl>
|
R
P
|
1
|
58 |
Large scale DNS hijacking detection using HTTPS scan data.In
recent years, several DNS hijacking / Man-in-the-Middle attacks have
been documented in which attackers gained access to the DNS settings of a
victim’s domain at the domain registrar and redirected traffic
through an attacker-controlled MitM proxy.
Detecting DNS changes for individual domains only
requires periodic lookups and comparisons with a set of expected DNS
records. This approach is not very scalable though. Instead, in this
research, the student will investigate the feasibility of a potential
different approach to (indirectly) detect DNS hijacking attacks, by
attempting to identify the attacker-controlled MitM servers.
The student should design, build and test different
filter algorithms that can possibly identify the MitM servers in
internet-wide scan / crawl data. For this research, the student can make
use of SSL / HTTPS scan data provided by Rapid7.
|
Christian Veenman <c.veenman=>minjenv.nl>
Niels Warnars <nwarnars=>os3.nl>
|
R
P
|
2
|
59 |
The current state of DNS Lame delegations; An analysis of the current state of lame delegations within the Swedish .se tld.The
Domain Name System (DNS), described by Paul Mockapetris in rfc1034 [1],
provides a mechanism for naming resources in such a way that the
human-readable host names are usable on different hosts and networks as
to machine-interpretable addresses. The DNS system was designed by
engineers with a focus on scalability rather than security. The security
requirement came with the availability of the internet to the general
public in the 1990’s. At that time, DNS already acquired an
indispensable position within the internet information structure.
This DNS system is used within email to locate the
mail agent which belongs to the hostname used in the email address. This
is done by mail exchange resource record (MX) within the DNS zone. This
MX record specifies which host has the mail agent for the domain and
this agent should accept mail for forwarding to the domain, possibly
together with other delegations like SRV records for IMAP, POP and VoIP.
David Barr[2] describes errors often found within the operation of DNS in rfc1912.
One of the errors which have been described are lame
delegations. Lame delegation are delegations like the MX record which
delegate functionality to another entity without the other entity in
place to serve this request. Some of them which are based on
mis-configuration others on configuration changes or legacy. In this
paper, we will study the impact of this lame delegations on the DNS
system related to internet services like e-mail delivery.
|
Arris Huijgen <AHuijgen=>deloitte.nl>
Alexander Blaauwgeers <alexander.blaauwgeers=>os3.nl>
|
R
P
|
2
|
60 |
Scaling Stack Trace Fingerprinting.Stack
traces contain information about the source code which can be matched
against the original code. If you have two versions of the source code
and the stack trace matches only one of them, then you know which
version is running on the server, and you can look into known
vulnerabilities for that version. Tools like: https://beanstack.io/
can match Java stack traces against a corpus of indexed libraries. A
similar technique (PoC available) is possible for JavaScript web
applications which are becoming more popular (using Node.js and npm). An
issue is that the database quickly grows to many millions of rows and
lookups become ever slower despite indexing. This limits how many
libraries one can reasonably import or how big a stack trace one wants
to lookup. This issue is even more relevant for JavaScript than Java,
since the ecosystem grows fast.
The goal of this project is to create a fingerprint
database for JavaScript, with focus on research and design of a more
efficient search and storage method for matching JavaScript stack traces
against known source code. The applicant should evaluate different
methods for indexing, storing, and querying data that allow to
fingerprint a given stack trace against a database. Algorithms should be
benchmarked for performance.
|
Luc Gommans <luc.gommans=>x41-dsec.de>
Mounir ElKirafi <Mounir.ElKirafi=>os3.nl>
|
R
P
|
2
|
65 |
Node to node communication in Vantage6
Vantage6
is a python framework for federated learning and used in medical
research. What is important to know is that vantage6 is based on the
Personal Health Train principle, where the algorithms (trains) are sent
to the data (stations) instead of the other way around.
In the vantage6 implementation a user sends a task to a
central server, which directs the task to the appropriate nodes
(datastations). Some algorithms need some coordination between nodes.
Right now the communication between the nodes goes through the central
server. However, this is not very efficient. The plan is to create a new
server which handles the node-to node communication. This will enable
us to use secure multiparty computation libraries like pysyft and mpyc
within the vantage6 framework. An "algorithm" within the vantage6
framework is simply a docker image that is made to work with the
infrastructure, so it is very flexible. You will create a proof of
concept to build this service for the vantage6 framework.
|
Djura Smits <D.Smits=>esciencecenter.nl>
Renee Witsenburg <Renee.Witsenburg=>os3.nl>
|
R
P
|
2
|
66 |
Containerized deployment of SURFnet8 service layer network.At
SURF we have a virtual test-bed that runs on an OpenStack cluster. With
WiStar we are able to deploy virtual network environments with
instances of the physical Juniper MX hardware (and some controller
software) that we also have available in the production network. Each
virtual instance and network environment however requires loads of
memory and CPU and therefore it is currently impossible to mimic our
complete network. Another drawback of the current setup is that the
internal network setup is not completely transparent. Q-in-Q on the
vMX's for example does not work out of the box. We would like to
investigate what could be a solution to completely mimic our SURFnet8
service layer network. This investigation should include deploying
lightweight containers (with the required functionality) in a suggested
topology. It it also preferred to have a working/transparent internal
network setup.
More information on the SURFnet8 network:
Other useful info:
-
https://github.com/networkop/k8s-topo
-
https://www.juniper.net/documentation/en_US/crpd/information-products/topic-collections/release-notes/19.2/jd0e26.html
|
Migiel de Vos <migiel.devos=>surf.nl>
Marijke Kaat <marijke.kaat=>surf.nl>
Peter Boers <peter.boers=>surf.nl>
Pim Paardekooper <Pim.Paardekooper=>os3.nl>
Inigo Gonzalez de Galdeano <Inigo.GonzalezdeGaldeano=>os3.nl>
|
R
P
|
1
|
67 |
Tipsy: How to Correct Password Typos Safely.Summary:
Instead of denying a login attempt with an incorrect password, our
typo-tolerant authentication system tries to correct common
typographical errors on behalf of the user.
Some forms of this have been seen in the industry but
there is limited research & open source development. We will explore
the tension between the security and usability of passwords.
|
Zeno Geradts <zeno=>holmes.nl>
Philippe Partarrieu <philippe.partarrieu=>os3.nl>
|
R
P
|
1
|
68 |
Antivirus evasion by user mode unhooking on Windows 10.Endpoint
Detection & Response (EDR) software aims to detect and mitigate
security threats by responding to malicious program activity. EDR
software for Windows typically monitors activity through hooking of
Windows APIs. Attackers, in turn, abuse this fact by unhooking the APIs
to hide a malicious program from the EDR's view.
Goal of this research is to support security assessments by:
- Gaining insight in detectability of current EDR unhooking techniques by specific EDRs running on Windows 10
- Finding a practical way to apply these unhooking techniques during red teaming exercises
|
Sander Ubink <Ubink.Sander=>kpmg.nl>
Tom Broumels <tom.broumels=>os3.nl>
|
R
P
|
2
|
70 |
Scaling of containerized network functions.Utilizing
programmable infrastructures is a promising approach to address the
challenges of supporting secure data sharing across domains of different
capabilities (in terms of network and security). In order to
dynamically set up a collaborative environment, we aim to containerize
network functions, ship out, and instantiate at the edge of a network.
Subsequently, we aim to ensure un-degraded security, reachability, and
performance during a data-sharing session. These functions might be,
e.g., applying packet encryption, deep packet inspection, segmentation.
These network functions should then be chainable in any order. There are
already two designs available to effectively intercept and redirect
traffic. One based on the combination of IP multiplexing and a reverse
proxy. The other one is partially based on the SOCKS protocol.
The focus of this work is placed on the scaling and
load-balancing of containerized network functions. Different network
functions might require different scaling strategies, e.g., horizontal
or vertical. Ideally, the scaling is done on-demand based on real-time
metrics (auto-scaling 1). Furthermore, in-transit network traffic should
not be affected by scaling. The student will extend one of the two
designs available (see above) with such a scaling mechanism and evaluate
the solution under different load scenarios. The questions to be
answered include:
- What metrics should trigger the scaling?
- What are the characteristics that result in either horizontal or vertical scaling?
- How to ensure that the reconfiguration does not affect in-transit traffic?
Reference medium.com - Autoscaling in Kubernetes:
A Primer on Autoscaling | by Sasidhar Sekar | Expedia Group Technology |
Medium
-
https://medium.com/expedia-group-tech/autoscaling-in-kubernetes-a-primer-on-autoscaling-7b8f0f95a928
|
Jamila Alsayed Kassem <j.alsayedkassem=>uva.nl>
Mohanad Elamin <melamin=>os3.nl>
ppaardekooper <Pim.Paardekooper=>os3.nl>
|
R
P
|
2
|
75 |
Good || evil: defending infrastructure at scale with anomaly- and classification-based network intrusion detection.Computer
networks are frequently attacked with new or previously unseen malware
in order to steal information or cause financial damage. Defending
against these has become a difficult task because the current signature
based detection mechanism only detects known malicious programs or
behaviors. Even if a signature exists for a known strain of malware,
obfuscation techniques can be used to avoid detection. Anomaly detection
attempts to solve this problem by modeling the normal behavior of
clients on a computer network and alerting an analyst of any deviations
from these patterns.
In order to achieve this, Machine Learning (ML)
algorithms are used, that range from classical fingerprinting and
frequency based observations, to Artificial Intelligence (AI) algorithms
and the use of Deep Neural Networks (DNN). A core challenge for this
approach is the selection, collection and extraction of feature vectors
that are fed into the classification algorithms.
We are interested in evaluating state of the art open
source solutions to classify malicious behavior in computer networks on a
modern large scale dataset, and compare the performance of the trained
model against a set of attacks in our own testbed. During this research
project, we intend to answer the following questions:
- How does a model perform that has been trained on a modern dataset, when deployed in a real world scenario?
- Which features prove the most useful for the detection task, and why?
- What performance can be achieved with the proposed imple- mentation with regard to throughput and hardware require- ments?
- Which algorithms are best suited for the task of anomaly detec- tion in computer networks and why?
Experiment and log files: https://mega.nz/file/MuY3BCaS#6E4ZBddcn4xxtbmeU4Ae6xEWJoE-lMR4uIuE15qppS0
|
Joao Novaismarques <joao.novaismarques=>kpn.com>
Jordi Scharloo <jordi.scharloo=>kpn.com>
Giovanni Sileno <G.Sileno=>uva.nl>
Philipp Mieden <Philipp.Mieden=>os3.nl>
Philippe Partarrieu <philippe.partarrieu=>os3.nl>
|
R
P
|
2
|
76
|
Validating the replacement filtering features of popular alternative admission controllers for Pod Security Policies.
Kubernetes is the de facto container orchestration
system which is introduced in 2015. The open source project, supported
by the Cloud Native Computing Foundation, introduced a new security
feature in version 1.4 (2016) called Pod Security Policies (PSP). This
feature is implemented as admission controller and allows cluster
administrators to enforce a security configuration baseline across a
namespace and therefore limiting the amount of pod capabilities that
users and groups can configure.
The research question we defined is:
- How to mitigate the security deficiencies that the removal of Pod Security Policy leave behind?
First, we will compare the different capabilities
of PSP and the alternative controllers named Gatekeeper, K-Rail and
Kyverno. The comparison will be based on literature, and the
documentation of the admission controllers and technical experiments in
Kubernetes testing clusters. The results should give insight to whatever
extend the controllers can replace PSP and possible remaining gaps that
they leave behind.
Secondly, we investigate the remaining gaps and
explore if other solutions cover these. If needed and time permits, we
will write examples of admission controllers that will close these gaps
and test it on a so-called kube-apiserver. The solutions will be tested
in the Kubernetes testing environments.
Lastly, we want to discuss the shortcomings of PSP and whether or not they exist in the evaluated controllers.
|
Wouter Otterspeer <wouter.otterspeer=>nl.pwc.com>
Maarten van der Slik <maarten.vanderslik=>os3.nl>
Frank Wiersma <frank.wiersma=>os3.nl>
|
R
P
|
2
|
77
|
Active Queue Management on Tofino programmable Dataplanes.Centralization
of the network’s intelligence, though Software Defined Networking, is
an advantage for applications where changes in the forwarding state do
not have strict real time requirements and depend upon global network
state. However, in cases where there delivered service depends upon
local state information, e.g., to support QoS constraints, the support
of programmable stateful data planes, can minimize the impact of latency
and overhead imposed by the intervention of a controller. Additional
functionalities provided by legacy switching equipment, such as rate
control and Active Queue Management to reduce network congestion and/or
scheduling, to provide QoS and fairness etc., require state information
maintained in the switch. Making stateful data plane algorithms
programmable, complementing the current programmable forwarding plane
solutions, can provide significant benefits in terms of meeting QoS
requirements/constraints (e.g. low latency communications), reduce the
control load on the SDN controller(s) and corresponding network overhead
while at the same time enhance network flexibility by enabling
customized traffic management. Towards the support of programmable
data-planes, P4 is a high-level declarative language for describing how
packets are processed in data paths. While the P4 language provide an
excellent way to define the packet processing behavior of network
devices, most programmable targets still typically have significant
non-programmable pieces.
The student will implement and evaluate a low latency,
low loss and scalable throughput (L4S) Active Queue Management scheme
in P4 using OpenLab’s P4 infrastructure (Edge-core Wedge 100BF-32X
switches with Barefoot Tofino P4 programmable ASIC).
|
Chrysa Papagianni <c.papagianni=>uva.nl>
Maurice Mouw <Maurice.Mouw=>os3.nl>
|
R
P
|
2
|
Due
to the pandemic situation only the presenting students and staff will
be in the SNE-lab B1.23, everyone else is asked to attend online.
Program (Printer friendly version: HTML).
Tuesday June 29 2021, online using bigbluebutton => bbb2.os3.nl , user rp2-guest , for pw contact us. |
Time |
#RP |
Title |
Name(s) |
LOC |
RP |
10h00 |
|
Introduction |
Cees de Laat |
|
|
10h05
|
10
|
Defeating the Fakes: Vocal Fake Detection using Discrete Fourier Transform in Neural Networks.
|
Tina Tami, Lars Tijsmans
|
NFI
|
2
|
10h30
|
60 |
Scaling Stack Trace Fingerprinting. |
Mounir ElKirafi |
x41-dsec |
2
|
10h55 |
|
Break
|
|
|
|
11h05 |
68 |
Endpoint Detection and Response evasion by unhooking. |
Tom Broumels |
KPMG |
2
|
11h30 |
33 |
Cloud Access Security Brokers (CASBs); Characterization of the CASB market and its alignment with corporate expectations. |
Anand Groenewegen, Marius Brouwer |
KPMG |
2
|
11h55 |
|
Lunch
|
|
|
|
13h05 |
76 |
Validating replacement filtering features of popular alternative admission controllers for Pod Security Policies. |
Maarten van der Slik, Frank Wiersma |
PWC |
2
|
13h30 |
36 |
Transparent malicious traffic detection using a BlueField DPU.
|
Jelle Ermerins, Ward Bakker |
DataDigest |
2
|
13h55 |
|
Break |
|
|
|
14h05 |
70 |
Scaling of containerized network functions |
Mohanad Elamin, Pim Paardekooper |
UvA |
2
|
14h30 |
75 |
Anomaly Based Network Intrusion Detection.
|
Philipp Mieden, Philippe Partarrieu |
KPN |
2
|
14h55 |
|
Break |
|
|
|
15h05 |
77 |
Active Queue Management on Tofino programmable Dataplanes.
|
Maurice Mouw |
UvA |
2
|
15h30 |
|
Close
|
Cees de Laat |
|
|
Program (Printer friendly version: HTML).
Monday Feb 1, 2021, online using bigbluebutton
|
Time |
#RP |
Title |
Name(s) |
LOC |
RP |
10h25 |
|
Introduction |
Cees de Laat |
|
|
10h30
|
66 |
Containerized deployment of SURFnet8 service layer network. |
Pim Paardekooper, Inigo Gonzalez de Galdeano |
SURF |
1
|
10h55
|
|
Break
|
|
|
|
11h05 |
34 |
Analysis of a rarely implemented security feature: signing Docker images with a Notary server.
|
Mohanad Elamin, Rio Kierkels |
KPMG
|
1
|
11h30 |
56 |
Analysis of a new privacy technology and its implementation: Image Cloaking.
|
Simon Carton, Danny Janssen |
KPMG |
1
|
11h55 |
|
Lunch
|
|
|
|
13h05
|
14
|
Using a verifiable and decentralized ledger as a basis for trusting hospital endpoints.
|
Matthijs Bartelink |
WhiteBox
|
1
|
13h30
|
6
|
Designing structured metadata for CVE reports.
|
Bart van Dongen |
Tjaldur |
1
|
13h55 |
|
Break |
|
|
|
14h05 |
41
|
Real time asset inventory in ICS. |
Artemis Mytilinaios |
Deloitte |
1
|
14h30 |
42
|
Improving availability in Industrial Control Systems using Software-Defined Networking. |
Marios Andreou, Joris Jonkers Both |
Deloitte |
2
|
14h55 |
|
Break |
|
|
|
15h05 |
57
|
Certificate Authorities as a Service in the Cloud: Is It Secure? |
Anand Groenewegen, Maurits Maas |
Deloitte |
1
|
15h30 |
31
|
Profiling (ab)user behavior of leaked credentials.
|
Maurice Mouw |
Deloitte |
1
|
15h55 |
|
Break |
|
|
|
16h05 |
27
|
Detection Real time video attack. |
Joris Janssen |
NFI |
1
|
16h30 |
67
|
Typo-tolerant authentication systems.
|
Philippe Partarrieu |
NFI |
1
|
16h55 |
|
Close
|
Cees de Laat |
|
|
Tuesday Feb 2, 2021, online using bigbluebutton. |
Time |
#RP |
Title |
Name(s) |
LOC |
RP |
10h00 |
|
Introduction
|
Cees de Laat |
|
|
10h05
|
37
|
Bluefield.
|
Ilyas Rahimi, Mounir Kirafi |
DataDigest |
1
|
10h30 |
65
|
Node to node communication in Vantage6 |
Renee Witsenburg |
eScienceCenter |
2
|
10h55 |
|
Break |
|
|
|
11h05 |
54
|
Hunting for malicious infrastructure using big data.
|
Shadi Alhakimi, Freek Bax |
NCSC
|
1
|
11h30
|
|
Close |
Cees de Laat |
|
|
Out of normal schedule presentations
Room B1.23 at Science Park 904 NL-1098XH Amsterdam.
|
Date |
Time |
Place |
#RP |
Title |
Name(s) |
LOC |
RP |
2020-09-16
|
10h00
|
online
|
59
|
The current state of DNS Lame delegations; An analysis of the current state of lame delegations within the Swedish .se tld. |
Alexander Blaauwgeers |
Deloitte
|
2
|
2020-12-17
|
11h00
|
online
|
58
|
Large scale DNS hijacking detection using HTTPS scan data.
|
Niels Warnars |
NCSC
|
2
|
|