Jen Johnson

About OGI
Final Report
About Me

  • Week One: We met the staff and Grad students at OGI and began work on a slide presentation that we will be giving within the next two weeks. This presentation covers network Security from an intrusion perspective. It was a little bit of a slow start, as our first two days were spent furiously reading a topic previously little known to us. However, once we began working on our slides and organizing the data we were covering, things seemed to pick up speed and interest.
  • Week Two: Our slide presentation appears to be done and we will be giving a dry run presentation to Dr. Feng next week. We have been installing Linux and Windows on our computers and have been familiarizing ourselves with everything. We will soon be attempting to hack into one another's computers to demonstrate different techniques.
  • Week Three: Linux is installed, updated and running, and I am trying to get used to it. I believe that I'm spoiled by easier operating systems! Some of the hacking programs that we are experimenting with are putting up quite a struggle, but we should have them ironed out soon. We have attended a reading group this week, and are scheduled to attend another this afternoon. Tomorrow we are going to a presentation given by a representative from Oracle which should be very interesting.
  • Week Four: I can't believe another week is gone. We presented part one of our slides to the group and got a lot of positive feedback. We will be presenting part two next week. We are also working on setting up Forensix on several computers in our office; this may take a few days.
  • Week Five: We attended several reading groups and are presenting the second half of our slides to the group tomorrow. We are almost through setting up the Forensix system on our Linux boxes, and are looking forward to learning all about it. We drove 6 hours down the Oregon Coast to visit Bandon and the Wildlife Safari there. We had a great time!
  • Week Six: We have finished presenting our slides to the group and the slides have been posted on the SYSL website. We are now actively working with the Forensix system and have setup both a front and back end to experiment with. I will be learning to write SQL querries to combat attempts to subvert the system.
  • Week Seven: It has been a week of meeting, reading groups and heavy reading. I have been reading some of the SQL queries that have been used on the Forensix system to determine the time frame on hacks and intrusions on the system, and am getting a stronger grip on the entire concept. I have been reading through a paper on Forensix written by one of the grad students here, but need more information and practice before I can write queries of my own.
  • Week Eight: It's hard to believe that we only have one more week here. To get the full results we really wanted, we would need another year! In any case, we seem to have run into a software glitch and may have to completely reinstall both Linux and Forensix on the front and back end machines. We are hoping that this is not the case, as it would be very time consuming... We will know more on Monday when we go through a trial run of our work.
  • Week Nine: We have run some bugs and queries, and although we would love more time to get more programs running, our time is winding down. We have been to a lot of talks and meetings lately and the Forensix project seems to be running well. I feel very lucky to have been exposed to so many new ideas and theories and look forward to implementing them in the future. What an amazing summer.
  • Week Ten: We will be in San Diego for the USENIX Security Symposium this week. With lectures and talks on Networking, Security and the like, it should be a great opportunity to connect with others in my field.