Past projects and current student presentations.

Enterprise Policies for Mobile Device Security
Ray Trygstad, Illinois Institute of Technology, Industry Professor of Information Technology & Management; Adjunct Professor of Public Administration

Suppose They Gave a Cyberwar and EVERYBODY Came?
Slater Technologies, Inc.
William Slater, Illinois Institute of Technology, Adjunct Industry Associate Professor of Information Technology & Management

Printer Watermark Obfuscation
Students: Bill Wesselman, Louis McHugh, Maya Embar, and Steve Martin

Embedded Device Security
Student: Fernando Martinez

Fractal Steganography
Students: Ivette Carrera and Felipe Sierra

MP3 Steganography
Students: Abdel Sy Fane, Amadou Barrow, Anthony Ludlam, and Girithar Anthay Suthakaran

JPEG Image Steganalysis Using Variation Technique
Students: Ana Orozco, Cruz Tovar, Indhi Powlette, and Stephen Daniel

JPEG Steganalysis: Hiding in Plain Sight
Student: David Stacey

DNS: Domain Name Service or Data Not Secure?
Student: Fernando Seror
The purpose of this project is to see if it would be possible for an attacker to use the DNS protocol to communicate with a bot of his own in an infected host in order to avoid being detected. Right now this communication is usually made through the IRC protocol, which is used for chatrooms with a known port easily blocked with a firewall and a pattern that raises a lot of alerts on any IDS available. This does not happen with DNS, which is a protocol used for the well functioning of the whole Internet, so if somebody is able to communicate through DNS packets it would result almost invisible and harder to block that IRC. The purpose of this project is to address if it would be possible to do this and if so, to investigate how to make the protocol safer.

An Investigation Into a Factory Reset of Android Devices
Students: Adrian Cabrera, Jason Choe, and Anthony Plovich

Cloud Forensics
Shawn Davis, Terence Fernandes, and Kenny Warren

MP3 Steganalysis
Ben Khodja, Erfan Setork, Kbrom Tewoldu, and Zach Wagner

Strict Transport Security
Joshua Hensley, Inaae Kim, and  Marius Maries

Hard Drive Steganography
Joshua Kenward, Michael Mohring, and Anthony Tiritilli

nmapGUI: An nmap Front End for the Future
nmapGUI is a Java GUI that can be used with any past, present or future version of nmap on any platform to scan a network.
Students: Anita Nandakumar, Sai Singh, and Celestin Zimulinda

An Open source IPS
An IPS or Intrusion Prevention System is based upon an Intrusion Detection System (IDS) with the added component of taking real time action, to prevent an intrusion once detected by the IDS.
Students: Sean Durkin, Michael Smith, and Kaebin Tan

Is That E-mail Really Spam?
Enhanced SPAM filtering efficiency by researching and then adding new filtering schemes that concretely distinguish messages that are not classified using more common filter rules.
Students: Alan Berow, Geeta Sookoo, Tresa Johnson, and Eric Neilsen

PC-CD: Rootkit Detection CD
An independent environment and tools that search the true hard drive space and files of the suspect operating system in order to detect and remove rootkits.
Students: Amer Jamal, Deborah Kimnach, and Olatunji Nowlin

Wireless Monitoring System
Monitor wireless LAN traffic without attaching to or modifying the existing LAN in any way. The approach uses an overlay network implemented with inexpensive hardware and free software that can be linked to a IDP or IPS if needed.
Students: Rene Contreras, Kirt Nishi, and Taher Hasan

Reg-IIT: Automated Network Registration Software
An automated system requiring wireless network users to register their hardware through a web interface before gaining full network access. Reg-IIT prompts for identification information that it matches to user’s previously stored “fingerprints.”
Students: David Hunt, Terry Lunn, and Michael Schorr

Securing a DHCP Server on a Local Network
To improve the security of an “open access” Dynamic Host Configuration Protocol (DHCP) environment, by giving the DHCP server the ability to authenticate a user before connecting to the network with a laptop.
Students: Dennis Hasenfang, Michael McLone, and Chris Willis

Voting over the Internet
Team members innovated a secure Internet-based voting system that could make it possible for registered voters to securely vote over the Internet.
Students: Mike Manzke, and Manjula Sridhar

Network Intrusion Detection System (NIDS)
Monitor both wired and wireless networks. The system provides automated alerting and is coupled with another system, GRATIS, that graphically identifies the source and location of the malicious traffic.
Students: Johnny Aquino, Ashok Bhojwani, Jeremy Hajek ,and Rajesh Patel

Linux IPTables Firewall Emulator/Analyzer (LIFE)
LIFE, working with rules dumped from an IPtables firewall using the iptables-save utility, aids IPtables firewall administrators in analyzing and debugging firewalls.
Student: Venkat Nandam

Zoning an Open Network for Education (ZONE)
The ZONE project layed the foundation for a layered security model approach using firewall / routers. It also facilitated location identification of offending computers, even when functioning with dynamic IP addresses.
Students: Shane Ladd, Kevin Vaccaro, and Jon Yonamine

Graphical Real-time Attack Topology Information System (GRATIS)
GRATIS is a 3D engine that displays graphically the location in a building where harmful messages are originating.
Students: Phillip LaBar and Roy Taylor

Real-Time Scanning/Reporting System
Determines the vulnerabilities of host computers and other intranet elements by extensively probing these elements, analyzing results, creating a database of vulnerabilities for each element.
Students: Eric Bonsu, Larry Reynolds, and Elsa Yee

Automatic Topology Discovery System
The ATDS facilitates physically locating such rogue computers using automated topological identification.
Students: Marina Antony, Carol Davids, and Ruksana Patel

Intrusion Detection System (IDS) for Rice Campus
This project entailed selecting, configuring and integrating an Intrusion Detection System that could monitor the events in a network and analyze them for signs of security problems.
Student: Hwanho Kim

Honeypots & Honey Tokens
Establish a honeypot and honeytoken that allowed for the tracking and analysis of SPAM traffic flow. Results were used to create a component that would improve filters, gateways, rules and servers that process email.
Students: Jason Jordan and Stephan Mititelu

Securing the New IIT Rice Campus Web Server
A Linux web server was configured to be secure mostly by minimizing services and securing the web-related applications and scripts.
Students: Balageetha Subbarayan, Jeffrey Rowland, and Sita Kalombo

Performing a Security Audit and Assessment
A security audit was performed on a district school system. The audit included vulnerability scans of the district network and computers, personal interviews, and security policy review.
Students: Judith Stevens, Yong Ji Kim, and Bachum Mataruke