

Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
mp2 for cs463 sp15 spring 2015 mp2
Typology: Summaries
1 / 2
This page cannot be seen from the preview
Don't miss anything!
Cybersecurity incidents are an ever-growing problem for companies. Recently, the President of the United States called for steps to improve cybersecurity, including new legislation that would limit liabilities of companies that report incidents that had happened to them. In this machine problem, we will study how companies can share cybersecurity incidents with each other without revealing unnecessary information about the incidents. Each group represents a company that has experienced 10 standard cybersecurity incidents. You seek other companies that have experienced incidents similar to the ones you have experienced. You want to learn whether other companies have experienced similar incidents, but without sharing the set of all incidents you have experienced. You are given a list of cybersecurity incidents in the file incident_list.txt labeled from 1 to 25. In this machine problem, each group will select exactly 10 cybersecurity incidents randomly from the list. You will use a private set intersection (PSI) protocol to see if other groups have experienced the same incidents. Each run of the protocol requires exactly two groups: a Client group and a Server group. You are required to run the protocol with at least two other groups.
Suppose a group Client wants to find if another group Server has experienced the same incidents as it has experienced. You will use the provided code as follows: Both the Client and the Server need to perform the following steps initially without sharing any information with each other at this stage:
Each group performs the role of Client and Server with at least two other teams, and does it for the following three settings.
Write a 1-page report as follows: A short paragraph on your experience with the first setting. A paragraph on your experience with the second setting, and what strategies you use to learn maximum amount of information. A paragraph on your experience with the third setting, and what strategies you use to learn maximum amount of information.