This is a Microsoft Research funded project and aims to provide an ICT-inspired solution to replace the current UPS+battery solution used in Pakistan to handle "load-shedding". Our solution will run over a smart-grid infrastructure with demand-side load-management enforced by signals from the utility companies. Our solution aims to be more cost-effective, efficient, and flexible.
In this project we have designed an application HomeOS that simulates load-shedding, monitors the power consumed by iPowerStrip using CurrentCost devices, and accordingly, remotely controls iPowerStrip sockets. To briefly describe the working of this application, it allows the user to choose some sockets that will remain controllable during load shedding. When the load shedding signal is simulated, these sockets can be turned on or off at will; other sockets will be automatically turned off. Furthermore, this application enforces a power-consumption limit: we set a power consumption threshold for iPowerStrip, exceeding which during the load shedding event results in all sockets on the strip being turned off. When the load-shedding termination signal is received, control of all sockets is returned to the user, and the limit on the power consumption is removed.
Underwater acoustic sensor networks (UWSN) is a relatively new research area, and remains quite challenging due to limited bandwidth, low data rate, severe multipath, and high variability in the channel conditions. These complicated and non-linear channel characteristics render incorrect most simplifying assumptions used in simulations. We believe that, while researchers have proposed several novel protocols, their use of models and simulations as the only form of validation and intra-protocol comparison remains removed from reality. We argue that research experimentation is hindered by two fundamental constraints: high cost of underwater networking experiments, and lack of a single, easily-replicable platform for evaluation. We present here Underwater Platform to Promote Experimental Research (UPPER): a low-cost (about $25/node) and flexible underwater platform designed to enable cost-effective and repeatable experimentation. We utilize COTS components to provide a HW/SW integrated solution that interfaces our custom hydrophones ($5 ea.) with laptops that act as an SDR-based physical layer, while allowing higher layer protocols to interact via a plug-and-play interface. We show that our platform can communicate over small (5-10m) distances and over a range of data rates (100-600bps). We believe our platform removes the barrier to validating simulation results in underwater environments and also allowing a fair comparison with related protocols.
Botnets are an evolutionary form of malware, unique in requiring network connectivity for herding by a botmaster that allows coordinated attacks as well as dynamic evasion from detection. Thus, the most interesting features of a bot relate to its rapidly evolving network behavior. The few academic and commercial malware observation systems that exist, however, are either proprietary or have large cost and management overhead. Moreover, the network behavior of bots changes considerably under different operational contexts. We first identify these various contexts that can impact its fingerprint. We then present Titan: a system that generates faithful network fingerprints by recreating all these contexts and stressing the bot with different network settings and host interactions. This effort includes a semi-automated and tunable containment policy to prevent bot proliferation. Most importantly, Titan has low cost overhead as a minimal setup requires just two machines, while the provision of a user-friendly web interface reduces the setup and management overhead.
We believe that SDN has been far too often looked at from the perspective of how Data Center Networks. We propose looking at how SDN concepts can improve the currently very static ISP service deliver model.
This Botnet Security Group was formed to complete the ICTRDF project titled "Design and prototyping of a Software defined network architecture to detect and prevent real-time botnet attacks".