Cyber Security Challenges a social informatics touch on old attacks S. Felix Wu University of California, Davis 16/5/2013IEEE Intelligence and Security.

Slides:



Advertisements
Similar presentations
1 Davis Social Links Social Network Kernel for Future Internet Design Norm Matloff, Michael Neff, S. Felix Wu, Computer Science Diane Felmlee Sociology.
Advertisements

Deconstructing Moodle for better Learning Design Helen M. Lynch Senior E-learning Consultant Australia’s National VET E-learning Strategy Webinar, March.
ICT iGCSE.  You should be able to describe the use of Internet developments such as:  Web 2.0  blogs  wikis  digital media uploading websites  social.
Northwest Region CSI S508 Social Media For Construction Professionals Joy Davis, CSI CCPR May 9, 2014 #NWRC14.
Davis Social Links FIND: Facebook-based INternet Design S. Felix Wu Computer Science Department University of California, Davis
Systems Engineering in a System of Systems Context
Privacy in Social Networks CSCE 201. Reading Dwyer, Hiltz, Passerini, Trust and privacy concern within social networking sites: A comparison of Facebook.
Search Engines and Information Retrieval
Davis Social Links S. Felix Wu Computer Science Department University of California, Davis
International Peer Program’s E-portfolio Project Experiencing Elgg Regina Lyakhovetska, International Student Advisor, Student Development.
Ecs289m Spring, 2008 Online Social Network (1) S. Felix Wu Computer Science Department University of California, Davis
CS 325 Computer Networks Sami Rollins Fall 2003.
UCDavis, ecs251 Spring /18/2007Davis Social Links1 Davis Social Links A Socially Structured P2P System S. Felix Wu University of California, Davis.
[ Date ] [insert your community foundation logo here] Give Local America A giving day opportunity.
Creating Collaborative Partnerships CHAPTER 15 Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Top 5 Facebook Tips Mark Smith Rosemary Turner. What is Facebook? Users create a personalised profile for themselves and then add people as friends to.
DR EBTISSAM AL-MADI Consumer Informatics, nursing informatics, public health informatics.
Social Networking – The Ways and Means Rosey Broderick May 2011.
Business Driven Technology Unit 4
Ryerson University Online to Success. Beginnings Online to Success is a transition program created by Queen’s University. For 5 consecutive years Ryerson.
IP Network Basics. For Internal Use Only ▲ Internal Use Only ▲ Course Objectives Grasp the basic knowledge of network Understand network evolution history.
Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.
Data Privacy Day 2012 on Campus Jolynn Dellinger Program Manager, Data Privacy Day National Cyber Security Alliance.
Past President General Ill. Jack Thomas 33 rd. WORD OF ENCOURAGEMENT FROM THE PRESIDENT OF THE GENERAL GRAND MASONIC CONGRESS I bring you greetings from.
Moodle: using an open learning management system to support student learning Keith Landa Purchase College
Qatar University Exemplary Online Course Award
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
Learning Law Orientation: August 16, Synthesis Judgment 4. Problem Solving 3. Spotting Issues 2. Understanding 1. Knowledge 1. Recognition vs.
INSTRUCTOR & FACULTY ORIENTATION Blackboard 9.1. What is Online Learning? The term online learning is used interchangeably with e-learning or electronic.
MOI PROJECT Gugulethu Mabuza Bachelor Science Electrical Engineering Michigan State University.
Kathleen Padova INFO 861 January 20, Emerged in different disciplines, academically Continued to develop in different disciplines in practice Information.
Martindale-Hubbell Connected and The Smile Train are teaming up to raise money for children through the end of 2009: $5 for every new corporate.
Sponsored by the National Science Foundation Davis Social Links Spiral 2 Year-end Project Review University of California, Davis PI: S. Felix Wu, Chen-Nee.
The Areas of Interaction are…
Understanding Cross-site Linking in Online Social Networks Yang Chen 1, Chenfan Zhuang 2, Qiang Cao 1, Pan Hui 3 1 Duke University 2 Tsinghua University.
1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis
Page 1 Battling Botnets: Implications for a Cybercrime Strategy July 8, 2010.
Eight Months of APS Wikipedia Initiative Rosta Farzan & Robert Kraut Human Computer Interaction Institute Carnegie Mellon University.
Project Focus Academy April 10, 2006 iVocalize Session #1 Click the ALL tab Add a comment in the text block, introducing yourself, your school and your.
& & YORK RESEARCH Research Communications Overview for ORU coordinators Elizabeth Monier-Williams—April 20, 2010.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
Introduction to Science Informatics Lecture 1. What Is Science? a dependence on external verification; an expectation of reproducible results; a focus.
OT Connections is AOTA’s new online community which allows occupational therapists, occupational therapy assistants and students to connect with each.
Social Media 101 An Overview of Social Media Basics.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Welcome to SC300: Big Ideas in Science Introduction, Goals, and Policies Freddie Arocho-Perez Kaplan University SC300: Big Ideas in Science.
Understanding the Human Network Martin Kruger LCDR Jodie Gooby November 2008.
Class will start at the top of the hour! Please turn the volume up on your computer speakers to access the audio feature of this seminar. WELCOME TO EP100.
CSC 450/550 Part 1: Introduction. CSC 450/550 Summary (1)Contact information (2)Course objective and topics (3)Course evaluation (4)* The layering principle.
2013 National Student Survey A briefing for School NSS contacts.
“ I'm still loving the fact that I share a virtual classroom with such a mix of students from all over the world. Other strengths include: engaging, up-
Welcome to SC300: Big Ideas in Science Introduction, Goals, and Policies Freddie Arocho-Perez Kaplan University SC300: Big Ideas in Science.
Learning and Growing Together WELCOME TO THE HAMILTON COUNTY SCIENCE LEADERS NETWORK MEETING October 15, 2015.
Connecting People With Information Transforming the Way the DoD Manages Data M. David Allen OASD(NII)/DoD CIO May 23, 2006 “The.
نظام المحاضرات الالكترونينظام المحاضرات الالكتروني.
National Science Foundation Science of Learning Centers RESEARCH EDUCATIONWORKFORCE.
CMT 3331 Coursework 3 Social Media Group member include: 1. Cheung sai lung M Hung Ka Po M Chow Tak Shing M Fong Ka Ho.
Learning and Growing Together WELCOME TO THE HAMILTON COUNTY SCIENCE LEADERS NETWORK MEETING October 15, 2015.
Computer Science and Engineering 1 Mobile Computing and Security.
Halton Hills Community Website & Box Office
+ Welcome to PAHO/WHO Sustainable Development and Health Toolkit for the UN Global Conference RIO + 20 Welcome to PAHO/WHO Sustainable Development and.
CMT Coursework 3 Social Media NAMESTUDENT NO. SHAM, JOHN SAI FUNM NG, WILLIAM WING CHEUNGM CHEUNG, THOMAS KIM YUETM MAN,
INNOVATIVE DIGITAL SOLUTIONS HOW WE DO BUSINESS….
Social Media Marketing: Social Media Websites is the right medium for all business marketing and its promotion. Social media can be effective branding.
Social Media Tools Building a company blog presence presented by Tom Swift Wednesday Nov 18, 2009: 10:45 AM (PST) – 11:30 AM Building Websites and Web.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Davis Social Links Relationship-Oriented Social-Centric Future Internet Architecture S. Felix Wu Computer Science Department University of California,
S. Felix Wu, UC Davis Background Interests w.r.t. QoE Perspectives
Social-Control Routing
Using positively framed prompts
Presentation transcript:

Cyber Security Challenges a social informatics touch on old attacks S. Felix Wu University of California, Davis 16/5/2013IEEE Intelligence and Security Informatics

2 Urgent! Please contact me! FROM:MR.CHEUNG PUI Hang Seng Bank Ltd Sai Wan Ho Branch 171 Shaukiwan Road Hong Kong. Please contact me on my personal box Let me start by introducing myself. I am Mr. Cheung Pui,director of operations of the Hang Seng Bank Ltd,Sai Wan Ho Branch. I have a obscured business suggestion for you. Before the U.S and Iraqi war our client Major Fadi Basem who was with the Iraqi forces and also business man made a numbered fixed deposit for 18 calendar months, with a value of Twenty Four millions Five Hundred Thousand United State Dollars only in my branch. Upon maturity several notice was sent to him,…

11/05/2009Davis Social Hong Kong University3

11/05/2009Davis Social Hong Kong University4 To me personally, this was a typical social spam.

11/05/2009Davis Social Hong Kong University5 Oops…

11/05/2009Davis Social Hong Kong University6 11/16 / /26 /2007 In my office 11/27 /2007 Spammed? 12/10 /2007 “Memoryless” For Felix Wu

IEEE Intelligence and Security Informatics OSN DSL/FAITH Policy/Reputation-based Route discovery Community Oriented Keywords Name-ID resolution Social Context FAITH over OSN Application Eric Felix Social-Enabled Applications and Games Existing Applications Wrapper Social network transformation tagging DSL  FAITH Emphasizing Trustworthiness in Social Informatics 6/5/20137

IEEE Intelligence and Security Informatics WillJohnAmy JustinFelix NancyMarySamTim Eric X-DSL 0x15EF2AC4 GENI geni /5/20138

908/16/2012Social Packets for Intel, Hillsboro, OR

6/5/2013IEEE Intelligence and Security Informatics10 Social Media Systems

Attacks leveraging Social Informatics 6/5/2013IEEE Intelligence and Security Informatics11

Socware Attacks leveraging Social Informatics 6/5/2013IEEE Intelligence and Security Informatics12

Social Media Systems But, they (attackers) can go much deeper! 6/5/2013IEEE Intelligence and Security Informatics13

Relationships & Structures 6/5/2013IEEE Intelligence and Security Informatics14

Applications 6/5/2013IEEE Intelligence and Security Informatics15 Justin EricFelix FB friends: 790+ FV neighbors: 30+ neighbor friend The “Add me please” push!!!

Social Interactions 16

Social Relationships and Structures Applications Social Interactions How much of you has been revealed and recorded? 6/5/2013IEEE Intelligence and Security Informatics17

Social Relationships and Structures Applications Social Interactions (Public Forums) How much of you has been revealed and recorded? 6/5/2013IEEE Intelligence and Security Informatics18

Public FB Discussions pages/groups: 880,664 posts: 18,618,481 comments: 150,430,423 likedby: 1,013,593,179 message_tags: 889,444 places: 4,735 shares: 8,924,826 story_tags: 102,943 fb_users: 116,388,463 6/5/2013IEEE Intelligence and Security Informatics19

6/5/2013IEEE Intelligence and Security Informatics20

21 Linguistic Features Cognitive Elements Affective Element

22 Occupy LA

23 Top 10%

6/5/2013IEEE Intelligence and Security Informatics24

Opinion Classification 25

Time of Participation 6/5/2013IEEE Intelligence and Security Informatics26

11/05/2009Davis Social Hong Kong University27 The “attacker” can do a lot more now!

Challenges Cyber Attacks deeply leveraging Social Informatics Risk Assessment on Public Social Informatics Real-Time Analysis and Monitoring of Social Interactions Binding Social Informatics with Computation, Communication, and Information Flow 6/5/2013IEEE Intelligence and Security Informatics28

Samples of Social Sciences Bandwagon Effect, Information Cascade, Media Framing, Spiral of Silence, Goal Detection, Opinion Formation Social Structure, community development, Social Capitals Psychological Linguistics 6/5/2013IEEE Intelligence and Security Informatics29

6/5/2013IEEE Intelligence and Security Informatics30 November 6-12 of 2011 November of 2011

And, of course,… 316/5/2013IEEE Intelligence and Security Informatics

32

6/5/2013IEEE Intelligence and Security Informatics33

Social Informatics 6/5/2013IEEE Intelligence and Security Informatics34 1. Social Relationship and Structures 2. Behavior 3. Influence among Content, Discussion and Community Formation  Partial Projection/Reflection of Real-life Human Relationship  Relationships established only via Online Interactions

Social Informatics But, they (attackers) can go much deeper! “We need to promote”, e.g., some fund raising activities – – On the subjects, you have deeply involved – Within the community, you have actively interacted with – And, your passion reveals much of yourself. 6/5/2013IEEE Intelligence and Security Informatics35

Challenges Social Informatics, Big Data Depth and Threat of Social Informatics Plane – It’s not just applications like Zynga’s Human + Cyber + Social Informatics – Future play ground for cyber security 6/5/2013IEEE Intelligence and Security Informatics36

6/5/2013IEEE Intelligence and Security Informatics37

Social Computing Leveraging Social Informatics within Computational Activities 6/5/2013IEEE Intelligence and Security Informatics38 Computing EntityInformation Entity RelationshipP ath Selection Social Entity Social Entity Systematic/Digitized

6/5/2013 Social-Centric OS Kernel Social Informatics 39IEEE Intelligence and Security Informatics

6/5/2013IEEE Intelligence and Security Informatics40 IPUPR. LYR. PAYLOADTCP/UDP HDR Attack Code Exploit (ReturnAddr) Decryption Code NOP System State Changes Focus on “Primitives” being used in the “Epsilon” phase!  Application dependent analysis

6/5/2013IEEE Intelligence and Security Informatics41

6/5/2013IEEE Intelligence and Security Informatics42