Workshops and Tutorials
                Session #1: Introduction to  Intrusion Detection
                    Session #2: Interactive Privacy: Utilizing Assessments to  Support Effective Decision-Making
                    Session #3: Towards an Open  Source Vulnerability Assessment Framework
                Session  #1: Introduction to Intrusion Detection
                Overview
                  The  information technology (IT) has long become an internal part of our modern  society.
                  It is integrated  in the infrastructure, vehicles, home appliances, daily communication etc.
                  Although  we are dependent on it at home and at workplace, we rarely realize what  challenges the rapid IT development brings to the information security and what  opportunities it opens for the attackers. The rapid increase of the number,  sophistication and impact of computer attacks makes the computer systems  unpredictable and unreliable, emphasizing the importance of timely intrusion  detection. This tutorial will introduce the notion of intrusion detection and  cover the essentials of intrusion detection process. The tutorial will explain  what intrusion detection means in practice and how it differs from other widely  used defense tools: firewalls, antivirus, antispam software. It will outline  the existing products and explain how they can be used to protect you. The  tutorial will demonstrate the intrusion detection process on the example of  Snort IDS
                Goals
                  – To  introduce the main concepts of intrusion detection field
                  – To  characterize the key issues related to intrusion detection process
                  – To  demonstrate the intrusion detection process on the example of Snort IDS
                Intended  audience
                  The  tutorial is targeted toward general audience interested in intrusion detection.  Audience is generally not required to have any background in intrusion  detection; however, it is expected to be familiar with the basic terms used in  computer security.
                Outline
                  1.  What is intrusion?
                  a.  Brief overview of network attacks, data driven attacks on applications, host  based attacks such as privilege escalation, unauthorized logins and access to  sensitive files, and malware.
                  2.  What is intrusion detection?
                  a.  What is the intrusion detection?
                  b.  What intrusion detection can and cannot do
                  c. IDS  vs. Firewall & Antivirus software
                  3.  Intrusion detection types
                  a.  Characteristics of host-based and network–based detection.
                  b.  Characteristics of anomaly and signature-based detection.
                  c. How  to decide which type is right for you
                  4.  Intrusion detection tools
                  a.  Overview of free & commercial intrusion detection tools
                  b.  Snort IDS:
                  i.  Overview
                  ii.  How Snort detects: rules
                  iii.  What Snort detects: alerts
                  5.  Future of IDS
                Facilitators
                  Natalia  Stakhanova is a Postdoctoral Fellow at the Information Security Center of  Excellence (www.ISCX.ca), Faculty of Computer Science, University of New Brunswick.  She received her Ph.D. degree in Computer Science from Iowa State University, USA.  She has extensive research experience in intrusion detection and general  information security field. Natalia has published 10 journal and conference  papers and has been the recipient of the “Nokia Best Student Paper Award” at  The IEEE International Conference on Advanced Information Networking and  Applications (AINA) in 2007. She has pending patent for a system and method for  simulating network attacks.
                Hanli  REN is a M.S. candidate at the Information Security Center of Excellence (www.ISCX.ca), Faculty of Computer Science, University of New Brunswick.  She received her B.Sc. degree in Electronic Engineering from Shanghai Jiaotong   University. She worked  with Alcatel Shanghai Bell Co., Ltd as a Software Engineer. Her current  research focuses on Alert correlation and Simulation of Network Attacks.
                Ali A.  Ghorbani received his PhD (1995) and Masters (1979) from the University of New Brunswick  and the George Washington University, Washington D.C., USA,  respectively. Currently, he is a Professor and Dean, Faculty of Computer Science,  University of New   Brunswick, Fredericton,   Canada. He is  also Director of Information Security Centre of Excellence (http://www.iscx.ca) and the lead researcher in  the Privacy Security and Trust (PST) Network. Dr. Ghorbani’s research  originated in software development, where he designed and developed a number of  large-scale systems. His current research focus is Web Intelligence,  Information and Network Security and Critical Infrastructures protection. He  has published over 220 journals, refereed conference papers, posters and  technical reports, and has edited 8 volumes in the area of Computer Science. He  has also supervised more than 120 research associates, postdoctoral fellows,  and undergraduate and graduate students. Together with two other researchers,  he received a CFI (Canada Foundation for Innovation) grant to establish a  research laboratory (LIDS Lab for the Investigation of Discrete Structures). He  is the project leader and principal investigator for two Atlantic Innovation  Fund projects, “Adaptive Websites” and “Fuzzy Adaptive Survivability Tools for  Intrusion Detection (FAST ID)”, valued at 1.05 million and 2.2 million,  respectively. In 2003, he received the university’s merit award for outstanding  contributions to the University   of New Brunswick. With  over 28 years of experience in academia and more than 10 years experience in  high- tech development at major industrial corporations, including experience  in R & D supervision, he brings strong technological visionary skills and  team leadership to the Intelligent and Adaptive Systems (IAS) and Network and  Information Security (NIS) research groups that he established in 2002 and  2004, respectively. The IAS and NIS  groups (http://ias.cs.unb.ca; http://nsl.cs.unb.ca) pursue research on machine and statistical learning, data  mining, intelligent agents and multi-agent systems, Web intelligence, trust and  network security. Dr. Ghorbani has organized and chaired 11 national and  international conferences and workshops. He is the Co-Editor-in-Chief of  Computational Intelligence, an international journal, and the Associate Editor  of the International Journal of Information Technology and Web Engineering and  the ISC Journal of Information Security.
                 
                Session #2: Interactive  Privacy: Utilizing Assessments to Support Effective Decision-Making
                Overview
                  The workshop is  based on the use of privacy impact assessments to explore the concepts  associated with the operationalization of privacy such as privacy design  requirement, and supporting mechanisms for decision-making in privacy such as  privacy risk management.  
                Goals
                
                  - Interactive  discussion of the approaches, methods and concepts about informational privacy  between the researcher and the practitioners 
 
                  - Offer  participants an opportunity to learn about privacy and their organizations  legislative obligations in providing services (public and private sectors), and  offer those that have knowledge an opportunity to further develop their skill  sets
 
                  - Help  participants understand how to use assessments to gauge the impact decisions  make on the privacy of data subjects
 
                
                Intended Audience
                  This workshop is targeted to decision-makers of public and  private sector organizations that rely on input from subject matter experts in  privacy, security and trust to make decisions that specifically impact the  privacy practices of their organizations.
                    
                  More generally, those involved with industries that are  regulated by privacy legislation, e.g. ehealth and egovernment practices, would  benefit from attending.
                 
                Outline
                  Introduction to  Privacy, Legislation, Assessment Process
                  Review /  Introduction of Decision Making Tools
                  Case Study 1 –  group discussion
                  Presentation of  Results, Lessons Learned (interactive)
                  Break
                  Case Study 2 –  breakout sessions
                  Presentation of  Results, Lessons Learned (interactive)
                  Break
                  Summary  (interactive)
                 
                Facilitator
                  Tracy Ann Kosa, PIA  Specialist
                  Office of the Chief  Information and Privacy Officer
                  Ministry of  Government Services, Government of Ontari
                Session #3: Towards an Open Source Vulnerability Assessment  Framework
                Overview
                  Vulnerability assessment is widely used to identify,  quantify, and prioritize the security vulnerabilities in a network, system, or  application. There is a wide spectrum of commercial resources available to  assess and manage vulnerabilities. In addition there are significant open  source and government resources relevant for vulnerability assessments  including standards, methodologies, numerous tools and databases that list  known vulnerabilities.
                  
                  We survey the available resources, and discuss potential benefits of creating a  full open source framework for vulnerability assessment. We also discuss some  of the challenges that need to be addressed in order to create it. The current  state of the art as supported by open source resources is evaluated against a  standard vulnerability assessment process from logistics and scanning, to  vulnerability assessment and reporting, and finally to penetration testing and  resolution. Of particular concern is the ability to monitor and update  vulnerability assessment as networks, systems, and applications evolve and new  vulnerabilities are catalogued.
                Goals
                  1.  Share Results of Student-led Initiative -Vulnerability Assessment: What is it?
                  -Open  Source Resources
                  -Issues  and Challenges
                  -Our  Vision for a Common Framework
                  2. Use  a case study example to illustrate the Open Source Security Testing Methodology  from the Institute for Security and Open Methodologies
                  (ISECOM) http://www.isecom.org/osstmm/
                  3.   Solicit feedback and community involvement in our initiative
                Intended  audience
                  Beginners  who want an introduction to vulnerability assessment. Stakeholders interested  in an Open Source Framework for Vulnerability Assessment.
                Outline
                  45  minutes: intro, background, tools, resources, issues
                  45 -  60 minutes: case study example
                  45 -  75 minutes: Proposed Framework, Feedback and discussion
                Facilitator
                  Liam Peyton, Ph.D., P.Eng., is a principal investigator for  the Intelligent Data Warehouse laboratory and Associate Professor at the University of Ottawa which he joined in 2002 after  spending 10 years as an industry consultant and instructor specializing in  business process automation, performance management, and software development  methodologies. His current research activities are focused on data integration  frameworks to support continuous monitoring, compliance, performance  management, and quality assurance.  He has degrees from Aalborg  Universitet (Ph.D. 1996),Stanford University (M.Sc. 1989), and McGill University  (B.Sc. 1984).