Past projects and current student presentations.
Enterprise Policies for Mobile Device Security
Ray Trygstad, Illinois Institute of Technology, Industry Professor of Information Technology & Management; Adjunct Professor of Public Administration
Suppose They Gave a Cyberwar and EVERYBODY Came?
Slater Technologies, Inc.
William Slater, Illinois Institute of Technology, Adjunct Industry Associate Professor of Information Technology & Management
Printer Watermark Obfuscation
Students: Bill Wesselman, Louis McHugh, Maya Embar, and Steve Martin
Embedded Device Security
Student: Fernando Martinez
Fractal Steganography
Students: Ivette Carrera and Felipe Sierra
MP3 Steganography
Students: Abdel Sy Fane, Amadou Barrow, Anthony Ludlam, and Girithar Anthay Suthakaran
JPEG Image Steganalysis Using Variation Technique
Students: Ana Orozco, Cruz Tovar, Indhi Powlette, and Stephen Daniel
JPEG Steganalysis: Hiding in Plain Sight
Student: David Stacey
DNS: Domain Name Service or Data Not Secure?
Student: Fernando Seror
The purpose of this project is to see if it would be possible for an attacker to use the DNS protocol to communicate with a bot of his own in an infected host in order to avoid being detected. Right now this communication is usually made through the IRC protocol, which is used for chatrooms with a known port easily blocked with a firewall and a pattern that raises a lot of alerts on any IDS available. This does not happen with DNS, which is a protocol used for the well functioning of the whole Internet, so if somebody is able to communicate through DNS packets it would result almost invisible and harder to block that IRC. The purpose of this project is to address if it would be possible to do this and if so, to investigate how to make the protocol safer.
An Investigation Into a Factory Reset of Android Devices
Students: Adrian Cabrera, Jason Choe, and Anthony Plovich
Cloud Forensics
Shawn Davis, Terence Fernandes, and Kenny Warren
MP3 Steganalysis
Ben Khodja, Erfan Setork, Kbrom Tewoldu, and Zach Wagner
Strict Transport Security
Joshua Hensley, Inaae Kim, and Marius Maries
Hard Drive Steganography
Joshua Kenward, Michael Mohring, and Anthony Tiritilli
nmapGUI: An nmap Front End for the Future
nmapGUI is a Java GUI that can be used with any past, present or future version of nmap on any platform to scan a network.
Students: Anita Nandakumar, Sai Singh, and Celestin Zimulinda
An Open source IPS
An IPS or Intrusion Prevention System is based upon an Intrusion Detection System (IDS) with the added component of taking real time action, to prevent an intrusion once detected by the IDS.
Students: Sean Durkin, Michael Smith, and Kaebin Tan
Is That E-mail Really Spam?
Enhanced SPAM filtering efficiency by researching and then adding new filtering schemes that concretely distinguish messages that are not classified using more common filter rules.
Students: Alan Berow, Geeta Sookoo, Tresa Johnson, and Eric Neilsen
PC-CD: Rootkit Detection CD
An independent environment and tools that search the true hard drive space and files of the suspect operating system in order to detect and remove rootkits.
Students: Amer Jamal, Deborah Kimnach, and Olatunji Nowlin
Wireless Monitoring System
Monitor wireless LAN traffic without attaching to or modifying the existing LAN in any way. The approach uses an overlay network implemented with inexpensive hardware and free software that can be linked to a IDP or IPS if needed.
Students: Rene Contreras, Kirt Nishi, and Taher Hasan
Reg-IIT: Automated Network Registration Software
An automated system requiring wireless network users to register their hardware through a web interface before gaining full network access. Reg-IIT prompts for identification information that it matches to userās previously stored āfingerprints.ā
Students: David Hunt, Terry Lunn, and Michael Schorr
Securing a DHCP Server on a Local Network
To improve the security of an āopen accessā Dynamic Host Configuration Protocol (DHCP) environment, by giving the DHCP server the ability to authenticate a user before connecting to the network with a laptop.
Students: Dennis Hasenfang, Michael McLone, and Chris Willis
Voting over the Internet
Team members innovated a secure Internet-based voting system that could make it possible for registered voters to securely vote over the Internet.
Students: Mike Manzke, and Manjula Sridhar
Network Intrusion Detection System (NIDS)
Monitor both wired and wireless networks. The system provides automated alerting and is coupled with another system, GRATIS, that graphically identifies the source and location of the malicious traffic.
Students: Johnny Aquino, Ashok Bhojwani, Jeremy Hajek ,and Rajesh Patel
Linux IPTables Firewall Emulator/Analyzer (LIFE)
LIFE, working with rules dumped from an IPTables firewall using the iptables-save utility, aids IPTables firewall administrators in analyzing and debugging firewalls.
Student: Venkat Nandam
Zoning an Open Network for Education (ZONE)
The ZONE project laid the foundation for a layered security model approach using firewalls and routers. It also facilitated the location identification of offending computers, even when functioning with dynamic IP addresses.
Students: Shane Ladd, Kevin Vaccaro, and Jon Yonamine
Graphical Real-time Attack Topology Information System (GRATIS)
GRATIS is a 3D engine that displays graphically the location in a building where harmful messages are originating.
Students: Phillip LaBar and Roy Taylor
Real-Time Scanning/Reporting System
Determines the vulnerabilities of host computers and other intranet elements by extensively probing these elements, analyzing results, creating a database of vulnerabilities for each element.
Students: Eric Bonsu, Larry Reynolds, and Elsa Yee
Automatic Topology Discovery System
The ATDS facilitates physically locating such rogue computers using automated topological identification.
Students: Marina Antony, Carol Davids, and Ruksana Patel
Intrusion Detection System (IDS) for Rice Campus
This project entailed selecting, configuring and integrating an Intrusion Detection System that could monitor the events in a network and analyze them for signs of security problems.
Student: Hwanho Kim
Honeypots & Honey Tokens
Establish a honeypot and honeytoken that allowed for the tracking and analysis of SPAM traffic flow. Results were used to create a component that would improve filters, gateways, rules and servers that process email.
Students: Jason Jordan and Stephan Mititelu
Securing the New IIT Rice Campus Web Server
A Linux web server was configured to be secure mostly by minimizing services and securing the web-related applications and scripts.
Students: Balageetha Subbarayan, Jeffrey Rowland, and Sita Kalombo
Performing a Security Audit and Assessment
A security audit was performed on a district school system. The audit included vulnerability scans of the district network and computers, personal interviews, and security policy review.
Students: Judith Stevens, Yong Ji Kim, and Bachum Mataruke