MS defense: More on Situation Aware Intrusion Detection, 9am Fri 4/27

MS Thesis Defense

Situation Aware Intrusion Detection Model

Sumit More

9:00am Friday, 27 April 2012, ITE 346, UMBC

Today, information technology and cyber-services have become the foundation pillars of every business and manufacturing industry. The importance of cyber-services and their extensive use by every section of the society has paved the way for cyber-crimes like espionage, politically motivated attacks, credit card frauds, unauthorized infrastructure access, denial-of-service attacks, and stealing of valuable data. Intrusion Detection Systems (IDS) are applications which monitor cyber-systems to identify any malicious activities, generate an alert when such an activity is detected, and redress the problem if possible. Most of the intrusion detection/prevention systems available today are based on rule-based or signature based activity monitoring which detect threats and vulnerabilities by cross-referencing the threat or vulnerability signatures in their databases. These Intrusion Detection Systems (IDS) face limitations in detecting newly published attacks or variants of existing attacks. They are also point solutions that focus on a single system/component.

We argue that integrating information coming from multiple data channels can lead to a better threat detection model. Data source of web including blogs, chat-rooms, forums etc. can be a good source of information for upcoming attacks or attacks whose signatures have not yet been tracked for the intrusion detection systems to catch. Semantic integration of the data sources from web, information from IDS/IPS modules at the network and host level, and the expert knowledge can be used to create a ‘Situation Aware Intrusion Detection Model’ which can lead to better intrusion detection and prevention results. In this work, we present such a system which makes use of semantic web technologies to find relationships between the information gathered from the web, sensor data coming from IDS/IPS modules and network activity monitors, and reasons over this data and expert provided rules in-order to detect possibility of a cyber attack.

Thesis Committee: Professors Anupam Joshi (chair), Tim Finin and Yelena Yesha

talk: Todros on Canonical Correlation Analysis, 2pm Wed 5/2

On Measure Transformed Canonical Correlation Analysis

Dr. Koby Todros, University of Michigan

2:00pm Wednesday, 2 May 2012, ITE 325b

In this work linear canonical correlation analysis (LCCA) is generalized by applying a structured transform to the joint probability distribution of the considered pair of random vectors, i.e., a transformation of the joint probability measure defined on their joint observation space. This framework, called measure transformed canonical correlation analysis (MTCCA), applies LCCA to the data after transformation of the joint probability measure. We show that judicious choice of the transform leads to a modified canonical correlation analysis, which, in contrast to LCCA, is capable of detecting non-linear relationships between the considered pair of random vectors. Unlike kernel canonical correlation analysis, where the transformation is applied to the random vectors, in MTCCA the transformation is applied to their joint probability distribution. This results in performance advantages and reduced implementation complexity. The proposed approach is illustrated for graphical model selection in simulated data having non-linear dependencies, and for measuring long-term associations between companies traded in the NASDAQ and NYSE stock markets.

Koby Todros was born in Ashkelon, Israel, in 1974. He received his B.Sc., M.Sc., and Ph.D. degrees in electrical engineering at 2000, 2006, and 2011, respectively, from the Ben-Gurion University of the Negev. He is currently a post-doctoral fellow with the Department of Electrical Engineering and Computer Science, in the University of Michigan. His research interests include statistical signal processing and estimation theory with focus on association analysis, uniformly optimal estimation in the non-Bayesian theory, performance bounds for parameter estimation, blind source separation, and biomedical signal processing.

UMBC Digital Entertainment Conference, 10-4 Sat 4/28, LH1

The Sixth UMBC Digital Entertainment Conference (DEC) will be held this Saturday, April 28 from 10:00am to 4:00pm in LH1 in the Biological Sciences building.

Every year since 2007 the students ofn the UMBC Game Developer's Club has organized the conference and invited speakers from the videogames industry to come in and discuss important topics in the games industry. DEC 2012 is sponsored by Zynga, the studio that developed Farmville and many other Facebook games.  One of the strenghts of the UMBC program in Graphics, Animation and Interactive Media (GAIM) is its strong ties to game development studios in the Maryland, DC and Northern Virginia area.

The 2012 DEC is open to anyone, and features an all-star lineup of speakers from Firaxis Games, Zynga East, Pure Bang, and Mythic Entertainment. Whether you are a high school student, go to UMBC or another university, or are already working in a different industry, you are sure find interesting information about how the games industry works, how some current developers got started, and what they do. If you are a game developer, you are sure to find high school students, UMBC students and students from other universities who are interested in jobs in the games industry.

Here is the schedule.

10:00am – Barry Caudill, Director of Gameplay Development at Firaxis
11:00am – Tim Train, Studio Manager at Zynga East
12:00pm – Lunch Break
1:00pm – Eric Jordan, Programmer at Firaxis
2:00pm – Ben Walsh, CEO of Pure Bang Games
3:00pm – Brian Johnson, Director of Online Operations at Mythic Entertainment

CSEE Students Take Part in 34th Annual Graduate Research Conference

photo courtesy www.umbc.edu/gsa

More than two-dozen Computer Science and Electrical Engineering graduate students are slated to present at the Graduate Student Association's annual Graduate Research Conference (GRC). The GRC will be held this Friday, April 27 and features a keynote presentation from Dr. Michael I. Nishimura, a UMBC alumnus who now works at Loyola University Chicago as a professor in the Department of Surgery, the Associate Director of the Oncology institute, the Associate Director of the Cancer Center Translations Research, and as Program Director of Immunologic Therapeutics.

This year, the CSEE presence at the GRC is even stronger than it was last year, when three CSEE students were awarded for outstanding presentations. The honorees were Varish Mulwad who received an award for an outstanding oral presentation on his dissertation research entitled "Generating Knowledge from Tables," Kavita Krishnaswamy who received an award for an outstanding oral presentation on her thesis research entitled "Path planning a roboticarm efficiently," and Akshya Iyengar who received an award for an outstanding poster presentation for her thesis research entitled "Estimating Temporal Boundaries of Events using Social Media Data".

Take a look at the list below, which includes the 27 CSEE graduate students who will present at the GRC this year.

Check out some photos from last year's conference.

Click here for a printable list of CSEE presenters.

 

Oral Presentations
Location: Sondheim 203

“Noise Reduction in AIRS Infared Earth Observing Radiance Grids using the Obscov Algorithm”
David Chapman, Milton Halem, Phuong Nguyen, and Jeff Avery
Time: 9:00 a.m.

“Heart Disease Prediction Model: A Data Mining Approach”
Soma Das
Time: 9:15 a.m.

“Measuring the Pulse Duration of Ultrafast Lasers”
Jared Dixon
Time: 9:30 a.m.

“Using Deceptive Packets to Increase Base-Station Anonymity in Wireless Sensor Network”
Yousef Ebrahimi and Mohamed Younis
Time: 9:45 a.m.

“SmartRate: A Rating Interpretation Mechanism for Agents in Smart Grid Markets”
Yasaman Haghpanah
Time: 10:00 a.m.

“Visualizing Changes to Directory Structure to Support Digital Forensics”
Timothy Leschke
Time: 10:15 a.m.

“Extracting Semantic Linked Data from Tables”
Varish Mulwad
Time: 10:30 a.m.

“Automatic Identification of Prescription Drugs Using Shape, Imprint, and Color”
Adrian Rosebrock
Time: 11:00 a.m.

“An Optical Sensor for a Ceramic Water Filtration System for the Detection of E.Coli Using a Microfluidic Chip”
Serina Woods
Time: 11:15 a.m.

 

Poster Presentations
Location: Albin O. Kuhn Library: 7th Floor

“Witness-based Saboteur Detection in Multi-agent Systems”
Petr Babkin
Time: 11:00 a.m.

“Entity Linking and Disambiguation for Smartphone Platforms”
Anurag Korde
Time: 11:00 a.m.

“Third-order Quadratically Converging, Quasi-Newton Optimization”
Rory Mulvaney
Time: 11:00 a.m.

“Supervised Learning Techniques for Predicting Risk of Breast Cancer using Genetic Information”
Aniket Bochare
Time: 11:12 a.m.

“Prostate Cancer Prognosis using Genomic Data”
Rohit Kugaonkar
Time: 11:12 a.m.

“Using Supervised Techniques for Classification of Conventional Data Items”
Nikhil Puranik
Time: 11:12 a.m.

“Surface Emitting Quantum Cascade Laser Array”
Xing Chen, Liwei Cheng, Dingkai Guo, and Fow-Sen Choa
Time: 11:24 a.m.

“Learning Sensitive to Multiple Sources of Costs”
Zachary Kurtz
Time: 11:24 a.m.

“Exploring Hidden Markov Model for Semantic Activity Prediction”
Amey Sane
Time: 11: 24 a.m.

“Calculating Representatives of Geographic Sites across the World”
Ashwinkumar Ganesan
Time: 11:36 a.m.

“Older Adults Interactions with a Touch Table Top Display Space”
Galina Madjaroff
Time: 11:36 a.m.

“Rendering of Smoke and Fire in a 3D Volume with Multiple Scattering”
Taekyu Shin
Time: 11:36 a.m.

“Chronic Disease Prediction: An Experimental Analysis Using the K-nearest Neighbor Algorithm”
Matthew Gately
Time: 11:48 a.m.

“Situation Aware Intrusion Detection Model”
Sumit S. More
Time: 11:48 a.m.

“Unsupervised Coreference Resolution for FOAF Instances”
Jennifer Sleeman
Time: 11:48 a.m.

“Towards an Intuitive Query System for DBpedia”
Lushan Han
Time: 12:00 p.m.

“Link Prediction Using Frequent Subgraphs”
Maksym Morawski
Time: 12:00 p.m.

“Modeling Motheye Antireflective Structures for Increased Coupling through As2S3 Optical Fibers”
Robert J. Weiblen
Time: 12:00 p.m.

 

MS defense: Distributed Model Consensus for Models of Locally Biased Measurements in Wireless Sensor Networks

MS Thesis Defense

Distributed Model Consensus for Models of Locally
Biased Measurements in Wireless Sensor Networks

Jacob Thompson

4:00pm Wednesday, 25 April 2012, ITE 325B, UMBC

Wireless sensor networks (WSNs) consist of interconnected microsensors, each of which collects measurements from its local environment, which are often used in monitoring and control applications. These applications make inferences about the global and local states of the deployment environment. However, due to the limited communication and energy resources at the sensors, gathering all the raw data at a central fusion/control point is impractical.

Hence, it is essential to have distributed learning and inference in WSNs, such as learning a consensus model from the locally learned models. Consensus is challenging due to the limited resources of the sensors and the inherent bias of the individual sensor models learned from their local sensing environments. Two leading approaches for this problem are the approach by Zheng et al which uses loopy belief propagation on a certain graphical model based on the WSN topology and the local models, and the approach by Xiao et al which relies on gossip averaging of the parameters of the local models.

We focus on multivariate linear regression models, such as Bayesian, Ridge, and Lasso regression models. We analyze and extend the loopy Gaussian belief propagation (GaBP) approach to model consensus, and compare its performance to the gossip averaging approach. We experimentally find that GaBP tends to converge much faster than gossip averaging, but to a less accurate estimated consensus model (especially in the presence of multiple cycles in its corresponding graphical model). We also find that gossip averaging along paths in the WSN, tends to provide much faster convergence to more accurate estimated consensus models as compared to GaBP.

Committee: Professors Kostas Kalpakis (chair), Tim Oates and Yun Peng

MS Defense: Shamit Patel on a Working Theory of the Learning Rule for Dendritic Integration

MS Thesis Defense

Towards Implementation of a Pattern Recognition System based on
a Working Theory of the Learning Rule for Dendritic Integration

Shamit Patel

4:00pm Monday 23 April 2012, ITE 346, UMBC

My goal is to develop a working theory of the learning rule for dendritic integration, and to then implement a pattern recognition system based on that learning algorithm so that the algorithm can be evaluated for its generalization ability. In this regard, this thesis presents an implementation of Jeff Hawkins and Dileep George's Hierarchical Temporal Memory (HTM) pattern recognition system that's based on an existing theory of the learning rule for dendritic integration – spike-timing-dependent synaptic plasticity (STDP). The integration of this learning rule is the novel contribution of this thesis. I found that the STDP HTM system achieved much higher probabilistic classification accuracy and better generalization ability than the non-STDP HTM system. Probabilistic classification accuracy is a way of measuring classification accuracy in which a testing pattern is classified correctly if its label appears in the group of labels output by the top-level node of the HTM network.

Committee: Professors Tim Oates (Chair), Yun Peng and Tim Finin

PhD defense: DiffServ Assured Forwarded and Robust Header Compression: Performance Analysis

 

Ph.D. Dissertation Defense

DiffServ Assured Forwarded and Robust
Header Compression: Performance Analysis

Houcheng Lee

12:30pm Monday, 23 April 2012, ITE 201b

Performance analysis of network architecture and protocols can be done by using modeling and simulation or using emulation techniques. Modeling and simulation can be used to obtain qualitative results about a network protocol through building models of protocols under drastic abstractions. One major concern of the modeling approach is the fidelity of the results from a model simulation.

This dissertation presents detailed performance analyses of two major Internet standards using emulation techniques. The standards investigated are Differentiated Services (DiffServ) architecture and Robust Compression (ROHC) standard.

The DiffServ architecture was proposed to support quality of services (QoS) implementation in TCP/IP networks. In the first part of dissertation, a new and scalable approach to performance analysis of DiffServ architecture, based on fluid flow modeling approximation to TCP/UDP based traffic flows, is used to emulate millions of competing TCP and UDP flows across networks of various sizes, complexities and link speeds. The emulation involved real-world network constraints, including traffic prioritizations, limited buffers in routers, link congestion, active queue management (AQM) and packet drop policies on congested links. The results provided first quantitative understanding of the interactions of traffic with different drop precedencies in AF1 class traffic in a congested network.

The Robust Header Compression (ROHC) is proposed to implement efficient IP header compression on bandwidth constrained links in TCP/IP networks. In the second part of dissertation, an emulation tool, called CORE, developed at NRL is used to analyze the performance of ROHC. ROHC compresses packet headers at a sender side, and decompresses them at the receiver side to increase efficiency of a communication link. The results provided quantitative understanding of compression gains from using ROHC standard for compressing IPv4/UDP and IPv6/UDP traffic on links.

Committee:

  • Dr. Deepinder Sidhu
  • Dr. Yelena Yesha
  • Dr. Konstantinos Kalpakis
  • Dr. Ted M. Foster
  • Dr. Edward Zieglar

MS defense: Heart Disease Prediction: A Data Mining Approach

Masters Thesis Defense

Heart Disease Prediction: A Data Mining Approach

Soma Das

2:00pm Monday, 23 April 2012, ITE 201B

Data mining is a field of computer science that combines statistical analysis and machine learning to detect hard-to-discern patterns from large amounts of data. It employs different algorithms to learn different patterns from training or experience and apply it to classify, predict or identify patterns. The healthcare environment is very information rich. There is a wealth of clinical data available within the healthcare systems. Also due to recent advancement of genomic research vast amount of genetic data are also available. Effective analysis tools are needed to discover hidden relationships and trends in these data. These tools are necessary to correctly diagnose people at risk of disease based on the derived knowledge from the data.

We used data mining techniques to evaluate the interaction between traditional risk factors and gene variants such as Single Nucleotide Polymorphisms (SNPs) towards Coronary Heart Disease (CHD) susceptibility in a prospective study of older population aged 65 and older. In our thesis we asked two questions whether we can predict CHD at birth or adding genetic information to traditional risk factors predict CHD better than traditional risk factors alone.We also analyzed two popular machine learning algorithms to determine the most efficient method on medical datasets mining. The evaluation is based on a set of performance metrics. We also applied a clustering method to identify different subgroups present in the selected datasets.

We chose eight traditional risk factors of CHD and 23 SNPs that had previously been reported to be associated with CHD. We then tested the association of these SNPs with CHD in cardiovascular Health Study (CHS). Based on previous studies, we pre specified a risk allele for each of 23 SNPs. We assigned coding values for homozygote, heterozygote, and the no risk homozygote SNPs and then combined these with traditional risk factors for each individual before feeding it to machine learning algorithms. We evaluated different classification algorithms using 10 fold cross validation test.

Receiver Operating Characteristic Curves (ROC) were plotted separately based on traditional risk factors alone and traditional risk factors plus SNPs. The increase in the Area Under Curve (AUC) was statistically significant for Whites and suggestive of improved CHD prediction for African American. We also found out that using only SNPs predicts CHD a little bit better than random guessing for only whites. The results gained from analysis suggest Naïve Bayes to be the best classifier for the given domain.

This study demonstrates the concept of using multiple SNPs as independent risk factors and indicates that it can improve prediction of incident CHD. Adding SNPs to traditional risk factors did not improve the prediction model dramatically as we expected but it was statistically significant.

Committee:

  • Dr. Michael Grasso (co-chair)
  • Dr. Anupam Joshi
  • Dr. Yelena Yesha

 

From Proton to Image: A Signal Processing Aspect of MRI

EE Graduate Seminar

From Proton to Image: A Signal Processing Aspect of MRI

Albert Kir
PhD (EE) Student, CSEE Dept/UMBC

11:30am-12:45pm Friday, 20 April 2012, ITE 237

Magnetic Resonance Imaging (MRI) is routinely used in clinical setting for its great diagnosis and prognosis ability, and is a heavily studied research area across multiple disciplines. MRI has its tie with signal and imaging processing community since it stemmed from the study of nuclear magnetic resonance (NMR). The technique of Fourier imaging makes MRI possible through manipulation of the NMR signals. The issue of imaging speed has always been at the heart of functional MRI (fMRI) and interventional imaging, where a high image frame rate is required or preferable. In the past decade, partly owing to the advance in imaging hardware, a wide range of image reconstruction algorithms have been developed to accelerate the image acquisition process. There has been SENSE, SMASH, GRAPPA, and many of their variations in the parallel imaging category from the early days to the current K-T techniques based on compressive sensing (CS). In this talk, the basic imaging principle for MRI will first be presented, and then a discussion of the first parallel imaging technique, SENSE, will be given. Lastly, the use of K-T FOCUSS on fMRI will be demonstrated.

Albert Kir received the BS degree in Computer Engineering n 2005 and the MSEE degree in 2009 from UMBC. He is currently a PhD (EE) student at UMBC. Mr. Kirs current research interest includes optimization of rapid imaging techniques for structural and functional images for MRI.

Host: Prof. Joel M. Morris

Panel Discussion: Graduate School: Before, During, and After

CRA-W Distinguished Lecture Series
University of Maryland, Baltimore County (UMBC)

Panel Discussion: Graduate School: Before, During, and After

10:00-11:00am Monday 16 April, 2012, UC 310, UMBC

Panelists

Dr. Ellen Zegura, Georgia Tech
Dr. Jeffrey Forbes, National Science Foundation
Mr. James MacGlashan (UMBC CSEE Ph.D. Candidate)
Ms. Alyson Young (UMBC HCC Ph.D. student)

 

As part of CRA-W's Distinguished Lecture event on Monday, April 16, we will be holding a panel about grad school and beyond.  The panelists are our two Distinguished Lecture visitors and two UMBC Ph.D. students. Topics will include why going to grad school, deciding between an M.S. and a Ph.D., how to succeed during grad school, and career possibilities after grad school. The panel is targeted at undergraduates who are considering applying to grad school, as well as graduate students in their early years.

Light refreshments will be served

SHORT BIOs

PROFESSOR ELLEN ZEGURA received the BS degree in Computer Science, the BS degree in Electrical Engineering, the MS degree in Computer Science and the DSc degree in Computer Science from Washington University, St. Louis. Since 1993, she has been on the faculty in the College of Computing at Georgia Tech. She currently serves as Professor and Chair of Computer Science. She received an NSF CAREER Award in 1995, a Washington University distinguished Alumni Award in 2008, and was selected as an IEEE Fellow in 2010. She was elected to the CRA Board of Directors in 2011.

Professor Zegura has conducted research and taught in computer networking for over 20 years. Her research interests include the Internet, with a focus on its topological structure and services, as well as mobile wireless networking. In network topology, she is the co-creator of the GT-ITM suite of Internet topology modeling tools, which remains in use 15 years after its original release. In mobile wireless networking, she and her colleagues invented the concept of message ferries to facilitate communications in environments where network connectivity is unreliable and/or sparse. Almost four years ago, she helped create the Computing for Good initiative in the College of Computing, a project-based teaching and research activity that focuses on the use of computing to solve pressing societal problems.

PROFESSOR JEFFREY FORBES is an Associate Professor of the Practice of Computer Science at Duke University in Durham, North Carolina. He is currently on leave with the National Science Foundation as a Program Director for the Education and Workforce Program in the Division of Computer and Network Systems, Directorate for Computer and Information Science and Engineering. He received his B.S. and Ph.D. Degrees in Computer Science from Stanford University and the University of California, Berkeley, respectively. His research interests include computer science education, intelligent agents,and social information processing.

Host: Professor Marie desJardins

1 22 23 24 25 26 37