The project: Computer systems are vulnerable. Not a day goes by without news of another data leak or security breach. Computer systems are massive, complex, human-created systems — and they are inherently flawed — we don’t have the technology to build perfect systems. Therefore, we need to develop mechanisms to respond quickly and accurately to intrusions. Our recent research efforts have focused on the development of provenance-based intrusion detection systems (IDS). We are becoming acutely aware of the difficulty of making any meaningful cross-evaluation of such systems due to inadequate availability of datasets and poor reproducibility practices.
This project aims at exploring reproducibility literature, practises and tools to develop solutions adapted to IDS. One of the major hurdles when one works on developing an IDS as an academic is how to accurately and fairly evaluate the system. In other words, to measure “how well” a given system behaves and compare this system against previously proposed approaches. One of the cornerstones of proper scientific enquiry is to make such evaluation repeatable. However, such an objective is mired by many issues, among those:
1) datasets used in previous systems are either not available or not adapted to the evaluated system;
2) source-code of most systems is not accessible even through interactions with authors, or when it is, the version used in a paper is not identifiable (the fabled grad student version);
3) evaluation metrics are inconsistent across papers, and this makes meaningful comparisons without 1) and 2) barely possible.
We propose to investigate methods to generate shareable IDS evaluations. The idea is not to build an IDS benchmark (a task seemingly impossible as systems must evolve alongside threats), but rather to explore technical and non-technical means to share software artefacts allowing the reproduction of an evaluation. Such a framework should also identify a set of minimum required properties that an IDS should fulfil.
The group: The successful candidate will join the University of Bristol Cyber Security Group (UBCSG). UBCSG is recognised jointly by the National Cyber Security Centre (NCSC) and the Engineering and Physical Sciences Research Council (EPSRC) as an Academic Centre of Excellence in Cyber Security Research, and hosts a Centres for Doctoral Training in Cybersecurity. The successful candidate will join a dynamic and growing research and student community. He/She will have opportunities to work and collaborate with international partners in academia and industry.
How to apply
Prior to application if you are interested, please email (firstname.lastname@example.org) with your CV and academic transcripts.
The formal application process can then be discussed. Please make an online application for this project at http://www.bris.ac.uk/pg-howtoapply. Please select
< Computer Science > on the Programme Choice page and enter details of the studentship when prompted in the Funding and Research Details sections of the form with the name of the supervisor.
First class in Computer Science or a related subject.
Basic skills and knowledge in Systems and Security required.
Competitive scholarship covers full UK PhD tuition fees and a tax-free stipend at the current RCUK rate (£14,777 in 2018 / 2019).
Informal enquiries, please email Dr Thomas Pasquier, email@example.com.
General enquiries, please email firstname.lastname@example.org.