Announcements Blog Projects Next class: spam infrastructure Next next class: Dave Aucsmith 1.

Slides:



Advertisements
Similar presentations
By: Jason Baltazar MIS 304 Credit Card Fraud and Prevention.
Advertisements

Profile Support Team Setting Up Your User Account on Profile e-portfolio Click to progress through this tutorial.
What is WEB SPAM Many slides from a lecture by Marc Najork, Microsoft: “Detecting Spam Web Pages”
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Copyright 2012 Trend Micro Inc. Raimund Genes, CTO Innovation In Cloud Security.
How to… Critically Evaluate Information Resources!
T /5115 Software Development Project I/II Project Planning Jari Vanhanen Ohjelmistoliiketoiminnan ja –tuotannon laboratorio Software Business and.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 15: Managing Information and Technology 1.Data Versus Information 2.Managing Data 3.Types of Information Systems 4.Computer Networks 5.Data Communication.
COMP 006: Computers Make It Possible 25 August 2004.
CSCD 555 Research Methods for Computer Science
CEP Welcome September 1, Matthew J. Koehler September 1, 2005CEP Cognition and Technology Who’s Who?  Team up with someone you don’t.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
ISP 1600 for Winter 2005 Web.Edu: How Internet Courses Work First meeting January 13, 2005.
CIS 310 Management Information Systems Course Overview Guthrie, Summer 2014.
Welcome to CS 395/495 Measurement and Analysis of Online Social Networks.
Article of the Week A common core literacy gold mine!
LINC Volunteer Course NorQuest College. The word “blog” is a short form of “web log.” A blog is an online place for you to share your ideas, thoughts,
DIY eTranscripts: A Guide to Building your own Electronic Transcript and Certified Document Solution Kristin Schuette Associate Registrar for Technology.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
The audio will be turned on just before our start time at 7:00 pm ET.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
CS300 Computers in Society Web- based course Rekha Gupta.
Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs Justin Ma, Lawrence Saul, Stefan Savage, Geoff Voelker Computer Science.
Staying Safe Online Keep your Information Secure.
What does Elsevier count? Use Measures for Electronic Resources: Theory & Practice ALCTS Program, ALA, Chicago Daviess Menefee Director, Library Relations,
Google Confidential and Proprietary 1 Advanced Docs Google Apps.
Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,
How to be an online student. How does it work? An online course follows a schedule and syllabus with due dates for assignments (just like an on-campus.
 Internet Regulation  Some people think that Internet Regulations and Business exchange are the same. That is why many consider this a controversial.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
9/8/07Web.Edu, first class1 ISP 1600 for Fall 2007 Web.Edu: How Internet Courses Work Class #1
CitiWiki Workshop CitiWiki Summer Workshop Week2 Day 1: Wiki Review and Wikispaces Li Xu CS, UMass Lowell.
Google Apps (Education Edition) A step guide to a successful deployment January 10 th, 2008 California Technology Assistance Project
1 CS4521 – Mobile and Topics in Web Programming L. Grewe.
Guidelines for ENSCONET partners in the use of the e-forum.
Spamscatter: Characterizing Internet Scam Hosting Infrastructure By D. Anderson, C. Fleizach, S. Savage, and G. Voelker Presented by Mishari Almishari.
DTCC Confidential DTCC Social Networking Policy Task Force January, 2008.
 Introduction to Computing  Computer Programming  Terrorisom.
Leveraging Asset Reputation Systems to Detect and Prevent Fraud and Abuse at LinkedIn Jenelle Bray Staff Data Scientist Strata + Hadoop World New York,
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
CSCI 572: Information Retrieval and Search Engines: Summer 2011 Prof. Chris A. Mattmann.
Internet Safety Internet Safety LPM
Welcome to Unit 8 Career Connections Kay Oistad. Agenda Greeting! Discussion Board Assignment Readings Case Study.
Welcome! Hello and welcome to English Composition 102, Introduction to Literature. I am looking forward to exploring, writing, and discussing literature.
Site Planning ARCH 1250 FALL 2012FALL 2012Prof.Paul.King NYC COLLEGE OF TECHNOLOGY Downtown Brooklyn Study.
Now what? 1.  I have short-listed projects I am interested in  I know the types of projects I would like to pursue  I have an idea of the resources.
Objective Advance your knowledge Practice to analyze and report open scientific literature Practice Critical Thinking Teamwork & Specialization Scientific.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Microsoft Research, Silicon Valley Geoff Hulten,
Managing Money Workshop The National Autistic Society AGM
Welcome to Introduction to Psychology! Let’s share a bit about where we are all from…
Social Media. Giving Generations: Matures  Born 1945 or earlier  Ages 65 and older  US population = 39 million  Estimated 79% give  21% of giving.
Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.
Done by… Hanoof Al-Khaldi Information Assurance
CS590B/690B Detecting Network Interference (Fall 2016)
ISYM 540 Current Topics in Information System Management
Unit 11 Communication & Collaboration
More leads, More enquiries, More sales
… not suitable viewing for lecturers of a nervous disposition
How to Protect your Identity Online PIYUSH HARSH
BioMedBridges – Work Packages 2 & 12
ENDANGERED ANIMALS A RESEARCH PROJECT
How clearly does your work flow and tell a story?
Presentation transcript:

Announcements Blog Projects Next class: spam infrastructure Next next class: Dave Aucsmith 1

Class Blog! (courtesy Chris Kanich) Please register (available via the syllabus page) Use it to: u Follow-up on discussions in class u Post interesting Internet crime-related stuff you find Class requirement u Over the course of the quarter, everyone should contribute at least one thoughtful post u Topics could include »New scams you’ve encountered personally »Summary/discussion of interesting stories from online news/blog sites (I’ve posted a list of cyber-crime relevant blogs) »Your own analysis, experiments, thoughts on the readings 2

Class projects For those of you taking the class for four units Solo or group (up to 3 people) Deliverable is minute class presentation u We’ll probably schedule it during the finals period Topic up to you, but you should discuss with me Try to decide topic within next two weeks so I can help you with resources, refining, etc In my experience a couple of these each year are publishable 3

Some assets UCSD specific u Spam feed (lots and lots of spam) u Spamscatter database (ip chains and rendered pages of spam urls) u Storm target addresses (hundreds of millions) u People with some experience (Chris, Brandon, Kirill) Phishtank (reported phishing sites) URIBL (domains that appear in spam) Blacklist sites (jizzillions) Spamtrackers.eu (identifies different spammers/gangs) (browse the forums) 4

Random topic ideas Phishing site detection via logo matching (taken) Measuring site “cloaking” u Different answers based on user-agent string or IP Literature review of MC/Visa transaction protection u E.g., how does the encrypted PIN block get created? Weaknesses? Human factors experiment on phishing u Importance of envelope context vs link info vs site appearance in risk judgment Spam domains? u Mine spam url domains (e.g. via uribl) and look at whois records to characterize… patterns to domain naming, registrar, etc? How long live? 5

More random ideas Compare overlap between blacklist feeds Build software to “feed” data to form grabber spyware and validate that it works with real spyware Investigate HYIP fraud and write report Characterize generation process for Storm mailing list Document and explain the “wholesale” traffic delivery business (e.g. mediatraffic.com) and the PTC/PTR businesshttp:// See if you can detect vote fraud in youtube (ala youtube automator) Do something interesting to analyze Blogspam Get a copy of PRStorm and explain how/why it works… 6

Next classes 10/16: Spam infrastructure u Geoff Voelker is guest interlocutor 10/21: David Aucsmith (Microsoft) u What we know, how we know what we know, and what we do with the information u Navy -> Intel (chief security arch) -> Microsoft (CTO security biz unit), now Sr. Director MS Institute for Adv Tech in Govts u NSA advisory board, Co-chair of FBI IT study group, Secret Service task force on computer-aided counterfeiting, US industry rep to the G8 on high tech crime, etc… 7