Lab for Internet and Security Technology Yan Chen

Slides:



Advertisements
Similar presentations
© Ravi Sandhu Introduction to Information Security Ravi Sandhu.
Advertisements

THE DHS PHISHING IQ TEST PART 1 LEGITIMATE V PHISHING How do you know if an is legitimate, or is a phony, phishing ? Take the.
Web Filtering and Deep Packet Inspection Artyom Churilin Tallinn University of Technology 2011.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Social media threats. Warning! May contain mild peril.
Detecting and Characterizing Social Spam Campaigns Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen and Ben Y. Zhao Northwestern University, US.
SPAM/BOTNETS and Malware  Neil Warner, CIO, GoDaddy.com  Moderator: Dan Kaplan, deputy editor, SC Magazine.
Hongyu Gao, Tuo Huang, Jun Hu, Jingnan Wang.  Boyd et al. Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication,
Emerging Tech Expo Social Networking November 18, 2009.
1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.
Towards Online Spam Filtering in Social Networks Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia and Alok Choudhary Lab for Internet and Security Technology.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
A First Course in Information Security
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
BotNet Detection Techniques By Shreyas Sali
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
Using Social Networks to Harvest Addresses Reporter: Chia-Yi Lin Advisor: Chun-Ying Huang Mail: 9/14/
SCAN: a Scalable, Adaptive, Secure and Network-aware Content Distribution Network Yan Chen CS Department Northwestern University.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
FaceBook and Your Business Women in Technology in Nigeria Presented by Mrs M.O Alade Women in Technology in Nigeria
Suspended Accounts in Retrospect: An Analysis of Twitter Spam Kurt Thomas, Chris Grier, Vern Paxson, Dawn Song University of California, Berkeley International.
Jamel Callands Austin Chaet Carson Gallimore. Downloading
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Uncovering Social Network Sybils in the Wild Zhi YangChristo WilsonXiao Wang Peking UniversityUC Santa BarbaraPeking University Tingting GaoBen Y. ZhaoYafei.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
8/30/2010CS 686 Definition of Security/Privacy EJ Jung CS 686 Special Topics in CS Privacy and Security.
APM for Security Forensics ENHANCING IT SECURITY WITH POST-EVENT INTRUSION RESOLUTION Lakshya Labs.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Cyber Security, Internet, and Wireless Networks Shigang Chen, Associate Professor Dept of Computer & Information Science & Engineering University of Florida.
Awicaksi E-Commerce Security & Payment System E-Commerce.
Spam ain’t as Diverse as It Seems: Throttling OSN Spam with Templates Underneath Hongyu Gao, Yi Yang, Kai Bu, Yan Chen, Doug Downey, Kathy Lee, Alok Choudhary.
Introduction to Systems Security (January 12, 2015) © Abdou Illia – Spring 2015.
Twitter Games: How Successful Spammers Pick Targets Vasumathi Sridharan, Vaibhav Shankar, Minaxi Gupta School of Informatics and Computing, Indiana University.
Social Media Setup Service Training. Why Offer this Service? Clients have heard about Social Media but may not understand it. We want to be there to help.
Detecting and Characterizing Social Spam Campaigns Yan Chen Lab for Internet and Security Technology (LIST) Northwestern Univ.
Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Best DDoS Protected Colocation Services
Building Our IT Security Lines of Defense Working together to protect Government’s IT systems.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Social Media Attacks.
Online Social Network: Threats &
Hummingbird: Privacy at the time of Twitter
Challenges We Face On the Internet
Network-based Intrusion Detection, Prevention and Forensics System
Xiaohong (Dorothy) Yuan North Carolina A&T State University 11/16/2017
Are these Ads Safe: Detecting Hidden A4acks through Mobile App-Web Interfaces Vaibhav Rastogi, Rui Shao, Yan Chen, Xiang Pan, Shihong Zou, and Ryan Riley.
Webroot Product Key code for Serial Key Activation
Facebook Clone Script Social Network Script Open Source Social Network Script.
Online Banking Security
משרד התעשייה, המסחר והתעסוקה פעולות המשרד לעידוד מגזר המיעוטים
Identity & Access Management
Northwestern Lab for Internet and Security Technology (LIST)
End-user Based Network Measurement and Diagnosis
Philip Nichilo Vincent Carestia
Introduction to Systems Security
Security Use Case Description Public charter schools serving grades K-12. Operates 40 schools and serves over 16,000 students and over 2,000 teachers.
Networking for Home and Small Businesses – Chapter 8
Northwestern Lab for Internet and Security Technology (LIST)
Who are the mass media? Traditional Media The “new media” Examples
Online Learning.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Security in mobile technologies
The OSI Security Architecture
Communicating in the IT Industry
Presentation transcript:

Lab for Internet and Security Technology Yan Chen Network-based Intrusion Detection and Prevention in Challenging and Emerging Environments: High-speed Data Center (SIGCOMM 2010) Web 2.0 (NDSS 2010) and Social Networks (SIGCOMM IMC 2010) Detecting and Characterizing Social Spam Campaigns Conduct the largest scale experiment on Facebook to confirm spam campaigns: 3.5M user profiles, 187M wall posts. Featured in Wall Street Journal, MIT Technology Review, ACM Tech News, and the McCormick Magazine Uncover the attackers’ characteristics. Mainly use compromised accounts. Mostly conduct phishing attack. Release the confirmed spam URLs, with posting times. http://list.cs.northwestern.edu/socialnetworksecurity http://current.cs.ucsb.edu/socialnets/