Commit 96056d99 authored by Simone Aonzo's avatar Simone Aonzo
Browse files

Extension to semester S6

parent 562e8f4d
......@@ -52,11 +52,11 @@ Students will become experienced with languages dedicated to digital audio proce
- IntroSec
* Introduction To Cybersecurity, S6, Simone Aonzo, 21 hours.
* The project consists of using Docker to virtualize a network with multiple hosts and create a cyber range, a controlled environment where cybersecurity professionals learn how to detect and mitigate cyber-attacks using the same equipment they will have in the real world. Finally, the student must act as a Red Team operator, breaching the security measures and providing a report on the vulnerabilities found. Any device that supports a version of GNU/Linux to run Docker is fine (even a Raspberry Pi >= 4).
* The project consists of using Docker to virtualize a network with multiple hosts and create a cyber range, a controlled environment where cybersecurity professionals learn how to detect and mitigate cyber-attacks using the same equipment they will have in the real world. Finally, the student must act as a Red Team operator, breaching the security measures and providing a report on the vulnerabilities found. Any device that supports a version of GNU/Linux to run Docker is fine (even a Raspberry Pi >= 4).
- IntroDB
* Introduction to Data Bases, S6, Pasquale Lisena, 21 hours
* The project consist in realising a NoSQL database for a specific domain, crawling and harmonising data from different sources, and choosing the easier data structure for the specific broblems. The required platform would need to be compatible with MongoDB, Neo4j and Python. Memory can be a limitation to the choice of the platform, so I think the computers of the lab would be better.
* The project consist in realising a NoSQL database for a specific domain, crawling and harmonising data from different sources, and choosing the easier data structure for the specific problems. The required platform would need to be compatible with MongoDB, Neo4j and Python. Memory can be a limitation to the choice of the platform, so I think the computers of the lab would be better.
- IntroSTATS
* Foundations of Statistical Inference, S6, Motonobu Kanagawa, 21 hours
......@@ -189,14 +189,21 @@ _Figure 3: bonus markers (animal faces) for obtaining extra points during the ma
- Semester: S5
- Proposer: Simone
- Vision statement: United we stand, divided we fall
- Description: in this project, students must configure their devices in order to create a mesh network. Then, they have to agree on a protocol to communicate in broadcast to which category belongs the animal (for example) that they detect through the webcam according to their image processing program. Then, using a consensus algorithm, decide "definitively" to which category it belongs. The logs must be in a predetermined format for evaluation.
- Involved courses/skills/knowledge:
- Description: in this project, students must configure their devices in order to create a mesh network. Then, they have to agree on a protocol to communicate in broadcast to which category belongs the animal (for example) that they detect through the webcam according to their image processing program. Then, using a consensus algorithm, decide "definitively" to which category it belongs. In this project we assume that all participants are cooperative and there are no malicious actors. The logs must be in a predetermined format for evaluation.
- Involved S5 courses/skills/knowledge:
* BasicOS and ComLab: config of the mesh network
* ImProc: image processing to detect and classify the animal
* ComProg: matching algorithm, programming
* IntroNet1: communication protocol
- Evaluation: We decide the "evaluation day" and we display some images on a big screen. Then, given a metric (like F1 score), each group will be evaluated on both the image classification of their image processing program, and the classification of their consensus algorithm.
- Target platform: Raspberry Pi 4 and camera
- Extension to semester S6: We assume the presence of malicious actors (however, the Denial-Of-Service is not among the capabilities of the attacker model). Students need to improve their communication protocol by making it *secure* through cryptographic primitives; namely, they must guarantee confidentiality, integrity, and authenticity of each message -- not availability since we excluded Denial-Of-Service attacks. Moreover, we also assume a non-cooperative environment, i.e., they can transmit wrong results trying to hack the consensus algorithm. Each transmitted/received message and the decisions made by the algorithms must be persisted in a database.
- Involved S6 courses/skills/knowledge:
* IntroNet2: improved communication protocol
* IntroSec: basic cryptography
* IntroDB: data persistence
* IntroSTATS: improved consensus algorithm
### High Level Idea and Application
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment