Oblivious IDS using Homomorphic Encryption

Intrusion Detection System (IDS) is used to protect internal networks of companies and organizations against malicious activities and policy violations. These systems are typically under the full control of the local system administrator. In this project, we propose to use Homomorphic Encryption techniques to design and implement an Intrusion Detection System that can run as […]

Read More
Machine Learning Based Encrypted Traffic Analysis

Accurate network traffic identification would assist network operations and management teams effectively on many different network tasks such as managing bandwidth and ensuring security. The demand for network management methods that optimize network performance and provide quality of service guarantees has increased substantially in recent years. As new social networking and voice over internet protocol […]

Read More
Anomaly Detection in SCADA Networks

SCADA (Supervisory Control and Data Acquisition) systems enable network-based monitoring and/or control of processes in various industrial sectors including electrical power distribution, energy, waste water and water. These systems serve as the backbone of much of Canada’s critical infrastructure. Security compromise of SCADA systems allows malicious attackers to gain control of the industrial processes in […]

Read More