CMSC 491A/691A- Spring 2004
Project
Overview
As discussed in class, we will do projects in groups of 2 students
where possible. Each group can either select their own topic with the
consent of the instructor, or select from one of the options listed
below and described in class. In each instance, the expectations from
491A enrollees is that they will either develop a tool to implement
some known attack, or where such tools are available,
tweak/improve/experiment with them. The expectation bar is higher for
691A enrollees, who are expected at least develop new tools, and
perhaps even look for new vulnerabilities. Depending on project needs, appropriate
equipment in the Cyberdefense Lab may be used. The suggested topics
include
- Breaking WEP/WPA/802.11i
- Attacking Bluetooth
- Securing Ad-Hoc Networks -- IDS, Secure Routing
- Developing trust relationships in Ad-Hoc networks
- Policy Driven Security and Privacy -- Improving Peer-Peer data
sharing systems
- Distributed Intrusion Detection
Documents (10 points)
Please note that
pdf,
ps and text (formatted to 72 columns) are the
only formats we will accept.
On or before March
7th, you will submit (electronically) a document detailing your proposal,
assumptions you have made, experiments you plan to run and a plan of
execution (including a proposed timeline). This should be emailed to
instructor with the subject "
Project Proposal".
On March
19th, and April 20th
you will submit a brief reports of your
progress to date, changes in the design if any, as well as an updated
timeline. Again, this will be via email ,
with the subject "[First|Second]Project Report".
The project report
detailing your work (the system design, experimental studies etc.) as
well as submission of your code, will be
due in a similar manner - emailed with subject as "Final Report". Code
should be attached as a tarred, gzipped
file. This will be due by May 10th
You will also arrange
to demonstrate your project to the instructor between May 3rd and
May 10th.
You are allowed and encouraged to discuss the project across
groups. Clearly, you are not allowed to share solutions. You may read papers and textbooks in this area
as well -- some pointers are provided in the reference list. However, you should
cite the sources you have consulted when documenting your project.
Anupam
Joshi
Last modified: Tue Mar 2 11:10:46 EST 2004