Health Monitoring System for Modeling Individual Exposure to Environmental Triggers of Asthma Episodes in the United Arab Emirates
Primary Investigator: Dr. Shayma Alkobaisi
This is an ICT funded project with collaborators from the US including prominent researchers in the fields of mathematics, computer science and engineering. This AED 2,700,000 research grant was for two years. Specifically, this interdisciplinary project supports general public health by developing a health care management system that reduces the cost, effort, and time spent in traditional visits to hospitals, and provides intelligent information that might be useful for improving public health care strategies. The proposed system collects and analyzes patients and environmental data in order to derive conclusions that will help in providing better insight into causes of environmental triggered diseases such as asthma.
Secure Communication Architecture for Thwarting UTM Attacks
Primary Investigator: Prof. Zouheir Trabelsi
Recent network architectures utilize many types of security appliances to combat blended attacks. However, managing multiple separate security appliances can be overwhelming, inefficient and expensive. Thus, multiple security features are needed to be integrated into a unified security architecture resulting in a Unified Threat Management system (UTM). In today’s existing UTM systems, whenever a security feature is needed, the corresponding module is just “attached or added on”. This approach of adding on may reduce the UTM performance dramatically, especially when security features such as IDS/IPS are enabled. This research project’s objective is to provide a complete UTM security architecture with unified communication solutions between the different modules to enhance UTM performance. The proposed algorithmic architecture firstly utilizes splay tree filters and pattern-matching algorithms to eliminate redundant checks on the same packet header fields and hence enhance packet filtering and deep packet inspection (DPI) performance. Specifically, the proposed mechanism uses network traffic statistics to dynamically optimize the order of the splay tree filters, allowing early acceptance and rejection of network packets. In addition, DPI signature rules are reordered according to their matching frequencies, allowing early packets acceptance. Secondly, it enhances UTM stateful inspection to optimize the management of different modules session tables. Thirdly, it investigates possible attacks on session tables and provide solutions to defend against these attacks. Finally, it studies the effect of DoS attacks targeting different UTM rule positions, as well as it investigates the profound effect of DoS attacks (with and without payload) on UTM performance. A prototype of the proposed architecture will be implemented and evaluated using real network traffic.
لايوجد محتوى عربي لهذه الصفحة
يوجد مشكلة في الصفحة التي تحاول الوصول إليها