96 research outputs found
Mechanisms of HIV-1-mediated CD4+ T cell depletion in lymphoid tissue
In this dissertation, I investigate the methods employed by HIV-1 to cause depletion of CD4+ cells within the lymphoid organ. Human ex-vivo tissue models for infection provide a relevant microenvironment for studying acute infection and subsequent pathogenesis, with only the influence of an innate immune response. Two viral isolates obtained from a rapid progressor patient with significantly different pathogenic phenotypes have been used to identify mechanisms of HIV-1-mediated cell death. The two isolates have significant sequence homology, particularly in the envelope (Env) region. However, isolate R3A demonstrates enhanced fusion as well as enhanced pathogenesis in both relevant in-vivo and ex-vivo organ model systems when compared to isolate R3B. Interestingly, when fusion is inhibited, R3A demonstrates pathogenic abilities through a bystander killing method as well. Analysis of Env proteins both in vitro and ex vivo demonstrates that enhanced Env-mediated fusion (determined by the C-terminal Heptad Repeat off gp41) contributes significantly to the distinct pathogenicity observed by the pathogenic R3A Env isolate, while CXCR4-binding affinity does not correlate with pathogenicity. In the absence of Env-mediated fusion, however, it is also observed that the pathogenic HIV Env continues to deplete cells. Further analysis of these findings demonstrated the role of the HIV Env V1/V2 domain upon activation of plasmacytoid dendritic cells (presumably due to enhanced CD4 binding affinity), which then induce bystander killing of uninfected lymphocytes. Finally, I examine the role that the HIV-1 Nef protein plays (in concert with an Env of high CD4 binding affinity) to activate the host innate immune response, which likely contributes to the observed bystander cell death phenotype. This analysis suggests that the Nef protein may enhance HIV Env expression on the surface of virus-producing cells and hence on budded virions, which can then more robustly activate pDCs. The findings from these studies aim to elucidate the mechanisms of pathogenicity utilized by a particularly pathogenic HIV Env isolated from a rapid progressor patient. These mechanisms shed light upon the nature of pathogenic viruses in total, and will hopefully aid in the development of therapy options for HIV-infected patients in the future
iTeleScope: Intelligent Video Telemetry and Classification in Real-Time using Software Defined Networking
Video continues to dominate network traffic, yet operators today have poor
visibility into the number, duration, and resolutions of the video streams
traversing their domain. Current approaches are inaccurate, expensive, or
unscalable, as they rely on statistical sampling, middle-box hardware, or
packet inspection software. We present {\em iTelescope}, the first intelligent,
inexpensive, and scalable SDN-based solution for identifying and classifying
video flows in real-time. Our solution is novel in combining dynamic flow rules
with telemetry and machine learning, and is built on commodity OpenFlow
switches and open-source software. We develop a fully functional system, train
it in the lab using multiple machine learning algorithms, and validate its
performance to show over 95\% accuracy in identifying and classifying video
streams from many providers including Youtube and Netflix. Lastly, we conduct
tests to demonstrate its scalability to tens of thousands of concurrent
streams, and deploy it live on a campus network serving several hundred real
users. Our system gives unprecedented fine-grained real-time visibility of
video streaming performance to operators of enterprise and carrier networks at
very low cost.Comment: 12 pages, 16 figure
A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection
Enterprise networks that host valuable assets and services are popular and
frequent targets of distributed network attacks. In order to cope with the
ever-increasing threats, industrial and research communities develop systems
and methods to monitor the behaviors of their assets and protect them from
critical attacks. In this paper, we systematically survey related research
articles and industrial systems to highlight the current status of this arms
race in enterprise network security. First, we discuss the taxonomy of
distributed network attacks on enterprise assets, including distributed
denial-of-service (DDoS) and reconnaissance attacks. Second, we review existing
methods in monitoring and classifying network behavior of enterprise hosts to
verify their benign activities and isolate potential anomalies. Third,
state-of-the-art detection methods for distributed network attacks sourced from
external attackers are elaborated, highlighting their merits and bottlenecks.
Fourth, as programmable networks and machine learning (ML) techniques are
increasingly becoming adopted by the community, their current applications in
network security are discussed. Finally, we highlight several research gaps on
enterprise network security to inspire future research.Comment: Journal paper submitted to Elseive
Verifying and Monitoring IoTs Network Behavior using MUD Profiles
IoT devices are increasingly being implicated in cyber-attacks, raising
community concern about the risks they pose to critical infrastructure,
corporations, and citizens. In order to reduce this risk, the IETF is pushing
IoT vendors to develop formal specifications of the intended purpose of their
IoT devices, in the form of a Manufacturer Usage Description (MUD), so that
their network behavior in any operating environment can be locked down and
verified rigorously. This paper aims to assist IoT manufacturers in developing
and verifying MUD profiles, while also helping adopters of these devices to
ensure they are compatible with their organizational policies and track devices
network behavior based on their MUD profile. Our first contribution is to
develop a tool that takes the traffic trace of an arbitrary IoT device as input
and automatically generates the MUD profile for it. We contribute our tool as
open source, apply it to 28 consumer IoT devices, and highlight insights and
challenges encountered in the process. Our second contribution is to apply a
formal semantic framework that not only validates a given MUD profile for
consistency, but also checks its compatibility with a given organizational
policy. We apply our framework to representative organizations and selected
devices, to demonstrate how MUD can reduce the effort needed for IoT acceptance
testing. Finally, we show how operators can dynamically identify IoT devices
using known MUD profiles and monitor their behavioral changes on their network.Comment: 17 pages, 17 figures. arXiv admin note: text overlap with
arXiv:1804.0435
Optimal Witnessing of Healthcare IoT Data Using Blockchain Logging Contract
Verification of data generated by wearable sensors is increasingly becoming
of concern to health service providers and insurance companies. There is a need
for a verification framework that various authorities can request a
verification service for the local network data of a target IoT device. In this
paper, we leverage blockchain as a distributed platform to realize an on-demand
verification scheme. This allows authorities to automatically transact with
connected devices for witnessing services. A public request is made for witness
statements on the data of a target IoT that is transmitted on its local
network, and subsequently, devices (in close vicinity of the target IoT) offer
witnessing service.
Our contributions are threefold: (1) We develop a system architecture based
on blockchain and smart contract that enables authorities to dynamically avail
a verification service for data of a subject device from a distributed set of
witnesses which are willing to provide (in a privacy-preserving manner) their
local wireless measurement in exchange of monetary return; (2) We then develop
a method to optimally select witnesses in such a way that the verification
error is minimized subject to monetary cost constraints; (3) Lastly, we
evaluate the efficacy of our scheme using real Wi-Fi session traces collected
from a five-storeyed building with more than thirty access points,
representative of a hospital. According to the current pricing schedule of the
Ethereum public blockchain, our scheme enables healthcare authorities to verify
data transmitted from a typical wearable device with the verification error of
the order 0.01% at cost of less than two dollars for one-hour witnessing
service.Comment: 12 pages, 12 figure
PrivacyCanary: Privacy-aware recommenders with adaptive input obfuscation
Abstract—Recommender systems are widely used by online retailers to promote products and content that are most likely to be of interest to a specific customer. In such systems, users often implicitly or explicitly rate products they have consumed, and some form of collaborative filtering is used to find other users with similar tastes to whom the products can be recommended. While users can benefit from more targeted and relevant recom-mendations, they are also exposed to greater risks of privacy loss, which can lead to undesirable financial and social consequences. The use of obfuscation techniques to preserve the privacy of user ratings is well studied in the literature. However, works on obfuscation typically assume that all users uniformly apply the same level of obfuscation. In a heterogeneous environment, in which users adopt different levels of obfuscation based on their comfort level, the different levels of obfuscation may impact the users in the system in a different way. In this work we consider such a situation and make the following contributions: (a) using an offline dataset, we evaluate the privacy-utility trade-off in a system where a varying portion of users adopt the privacy preserving technique. Our study highlights the effects that each user’s choices have, not only on their own experience but also on the utility that other users will gain from the system; and (b) we propose PrivacyCanary, an interactive system that enables users to directly control the privacy-utility trade-off of the recommender system to achieve a desired accuracy while maximizing privacy protection, by probing the system via a private (i.e., undisclosed to the system) set of items. We evaluate the performance of our system with an off-line recommendations dataset, and show its effectiveness in balancing a target recommender accuracy with user privacy, compared to approaches that focus on a fixed privacy level. I
- …