Skip to main content

Find us on

facebook youtube flickr twitter itunes u logo

 

Past Programs  

mechael youtube

Keynote: Securing IT in Healthcare: Part III
Patty Mechael
mHealth Alliance
May 16, 2013

 nilsen youtube

Keynote: SITH3, Technology-Enabled Remote Monitoring and Support
Wendy Nilsen
National Institutes of Health (NIH)
May 17, 2013

sith3 panel1 youtube

Intersection of mHealth and Behavioral Health
SITH3 Workshop, Panel 1
May 17, 2013

 

Newsletter 

ists newsletter summer 2012

 

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu

Wireless Mobile Networking for Cyberassurance

Project Summary

The objective of this research is to develop networking technologies that will help prevent and combat cyber-crime as well as strengthen computer and network systems against future attacks. The work involves architecting new networking infrastructure tolerant to attacks, and novel network protocols for tracking attackers.

To validate our proposed method, we have developed a software tool that, when fed with packet level traces, would calculate the PSD estimates of traffic flows contained in the traces and determine whether they exhibit periodicity or not by means of a statistical hypothesis test. Furthermore, we use real-world traces obtained on May 6 and 7, 1999, at an egress point of a Harvard campus network to verify the effectiveness of the software tool. The result shows that the proposed method correctly identify 81.8% of the TCP flows as exhibiting periodicity, while only 15.7% of the non-TCP flows are misidentified as having periodicity, showing that it is indeed a feasible way to distinguish legitimate TCP flows from non-periodic, open-loop traffic, which typical DoS attacks use.

  • Project Lead: H. T. Kung (Harvard)