 Louena L. Manluctao  East Early College High School  Houston Independent School District  Dr. Guofei Gu  Assistant Professor  Department of Computer.

Slides:



Advertisements
Similar presentations
Network Security Highlights Nick Feamster Georgia Tech.
Advertisements

1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
Analysis and Modeling of Social Networks Foudalis Ilias.
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
SOCELLBOT: A New Botnet Design to Infect Smartphones via Online Social Networking th IEEE Canadian Conference on Electrical and Computer Engineering(CCECE)
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
The testbed environment for this research to generate real-world Skype behaviors for analyzation is as follows: A NAT-ed LAN consisting of 7 machines running.
A Hierarchical Hybrid Structure for Botnet Control and Command A Hierarchical Hybrid Structure for Botnet Control and Command Zhiqi Zhang, Baochen Lu,
Small-World Graphs for High Performance Networking Reem Alshahrani Kent State University.
Web 2.0 security Kushal Karanjkar Under guidance of Prof. Richard Sinn.
PROGRAMMING AND CRYPTOGRAPHY Wilber R. Rivas Del Rio High School San Felipe Del Rio CISD Dr. Guofei Gu Director of SUCCESS laboratory Secure Communication.
Wilber R. Rivas Del Rio High School San Felipe Del Rio CISD Dr. Guofei Gu Director of SUCCESS laboratory Secure Communication and Computer Systems Computer.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Overview of Cryptography Oct. 29, 2002 Su San Im CS Dept. EWU.
Search in a Small World JIN Xiaolong Based on [1].
Building Robust and Automatic Authentication Systems with Activity- Based Personal Questions Mentor: Danfeng Yao Anitra Babic Chestnut Hill College Computer.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
Economics of Malware: Epidemic Risk Model, Network Externalities and Incentives. Marc Lelarge (INRIA-ENS) WEIS, University College London, June 2009.
Systematic Analysis of Interactome: A New Trend in Bioinformatics KOCSEA Technical Symposium 2010 Young-Rae Cho, Ph.D. Assistant Professor Department of.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology USENIX Security '08 Presented by Lei Wu.
(Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Oct 16th, 2012.
Brad Neuenswander, Interim Commissioner Kansas State Department of Education 2014 Summer Leadership Conference.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
An Evaluation model of botnet based on peer to peer Gao Jian KangFeng ZHENG,YiXian Yang,XinXin Niu 2012 Fourth International Conference on Computational.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Discovery of Emergent Malicious Campaigns in Cellular Networks Nathaniel Boggs, Wei Wang, Suhas Mathur, Baris Coskun, Carol Pincock © 2013 AT&T Intellectual.
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu, Roberto Perdisci, Junjie Zhang, and.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Detection Unknown Worms Using Randomness Check Computer and Communication Security Lab. Dept. of Computer Science and Engineering KOREA University Hyundo.
Khoon Yu Tan Math Teacher John H Reagan High School Houston Independent School District Dr. Wilbert Wilhelm Barnes Professor Industrial and Systems Engineering.
Who Is Peeping at Your Passwords at Starbucks? To Catch an Evil Twin Access Point DSN 2010 Yimin Song, Texas A&M University Chao Yang, Texas A&M University.
Aemen Lodhi (Georgia Tech) Amogh Dhamdhere (CAIDA)
Social Network Analysis Prof. Dr. Daning Hu Department of Informatics University of Zurich Mar 5th, 2013.
BotGraph: Large Scale Spamming Botnet Detection Yao Zhao, Yinglian Xie, Fang Yu, Qifa Ke, Yuan Yu, Yan Chen, and Eliot Gillum Speaker: 林佳宜.
Cross-Analysis of Botnet Victims: New Insights and Implication Seungwon Shin, Raymond Lin, Guofei Gu Presented by Bert Huang.
Cyber Security, Internet, and Wireless Networks Shigang Chen, Associate Professor Dept of Computer & Information Science & Engineering University of Florida.
Botnets Usman Jafarey Including slides from The Zombie Roundup by Cooke, Jahanian, McPherson of the University of Michigan.
Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design Authors: Matei Ripeanu Ian Foster Adriana.
Securing the Grid & other Middleware Challenges Ian Foster Mathematics and Computer Science Division Argonne National Laboratory and Department of Computer.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Informatics tools in network science
KIDS GRANT. The Grant Department of Education Technology Innovation Challenge Grant Classroom technology integration Key Instructional Design Strategies.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
2009/6/221 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Reporter : Fong-Ruei, Li Machine.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Item 4 - Intrusion Detection and Prevention Yuh-Jye Lee Dept. of Computer Science and Information Engineering National Taiwan University of Science and.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Gross Niv Analyzing Spammer’s Social Networks for Fun and Profit
CS/ECE 578 Cyber-Security Dr. Attila Altay Yavuz
CSCE 715: Network Systems Security
A Fault Tolerance Protocol for Uploads: Design and Evaluation
Cryptography Applied to Linear Functions
Epidemic spreading in complex networks with degree correlations
School of Electrical and Computer Engineering
Willis Marti: Director, Networking
by Hyunwoo Park and Kichun Lee Knowledge-Based Systems 60 (2014) 58–72
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
Dieudo Mulamba November 2017
Yan Chen 陈焰 Assistant Professor, Department of Electrical Engineering and Computer Science, Northwestern University Education Univ. of California at Berkeley,
Modeling and Measuring Botnets
Department of Computer Science University of York
Peer-to-Peer and Social Networks
Computer Security Chapter Two
Basics Of Symmetric Encryption
IT Applications with Emerging Techniques: Security Solutions
Presentation transcript:

 Louena L. Manluctao  East Early College High School  Houston Independent School District  Dr. Guofei Gu  Assistant Professor  Department of Computer Science & Engineering  Director, SUCCESS LAB  TEXAS A & M University

EDUCATION Ph. D in Computer Science Georgia Institute of Technology M.S. in Computer Science Fudan University

Network and system security such as Internet malware detection, defense, and analysis Intrusion detection, anomaly detection Network security Web and social networking security

Success Lab Students PhD  Seungwon Shin  Chao Yang  Zhaoyan Xu  Jialong Zhang MS  Robert Harkreader  Shardul Vikram  Vijayasenthil VC  Lingfeng Chen Alumni  Yimin Song (MS, first employment: Juniper Networks)

 Network & Web Security  Botnet Analysis: Conficker  Seungwon Shin and Guofei Gu. "Conficker and Beyond: A Large-Scale Empirical Study." To appear in Proceedings of 2010 Annual Computer Security Applications Conference (ACSAC'10), Austin, Texasi, December 2010.

 Network & Web Security  Botnet Analysis: Conficker  Seungwon Shin, Raymond Lin, Guofei Gu. "Cross-Analysis of Botnet Victims: New Insights and Implications." To appear in Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection (RAID 2011), Menlo Park, California, September 2011.

 Wireless Security  Rogue Access Point Detection  Yimin Song, Chao Yang, Guofei Gu. "Who Is Peeping at Your Passwords at Starbucks? -- To Catch an Evil Twin Access Point." In Proceedings of the 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'10), Chicago, IL, June 2010

 Social Networking Website Security  Twitter Spammer Accounts Detection  Chao Yang, Robert Harkreader, Guofei Gu. "Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers." To appear in Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection (RAID 2011), Menlo Park, California, September 2011.

 Malware Analysis  Analysis of binary code and source code  Dynamic Analysis  Static Analysis  Reverse Engineering  Protocol  Semanticis

 Intrusion and Detection System  Enterprise Network Security  Assist Us with computer terms

 The art of secret writing  Converts data into unintelligible (random looking) form  Must be reversible (recover original data without loss or modification)

 Plaintext: a message in its original form  Ciphertext: a message in the transformed, unrecognized form  Encryption: the process that transforms a plaintext into a ciphertext  Decryption: the process that transforms a ciphertext to the corresponding plaintext  Key: the value used to control encryption/decryption.

 To Solve Practical Security Problems  Internet malware detection, defense, and analysis  Intrusion detection, anomaly detections  Network security  Web and social networking security  To help society and country from threat of national security

 Help researchers identify the type of responses that are most effective against botnets  Design Goals  assist the defenders in identifying possible types of botnets  describe key properties of botnet classes

Estimate of overall utility. Measure the largest number of bots that can receive instructions and participate in an attack. Average amount of bandwidth that a bot can contribute, denoted by B.

Network diameter is one means of expressing this efficiency. This is the average geodesic length of a network.

Clustering coefficient measures the average degree of local transitivity. The transitivity measure index generally captures the robustness of a botnet

Random graphs are created to avoid creating predictable flows. In a random graph, each node is connected with equal probability to the other N-1 nodes. The chance that a bot has a degree of k is the binomial distribution:

Acknowledgements Texas A&M University Dr. Guofie Gu Nuclear Power Institute Texas Workforce Commission National Science Foundation Chevron

Wilber Rivas, Math Teacher, Del Rio High School Chao Yang, Phd Student Jialong Zhang, Phd Student