Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber Security Challenges a social informatics touch on old attacks S. Felix Wu University of California, Davis 16/5/2013IEEE Intelligence and Security.

Similar presentations


Presentation on theme: "Cyber Security Challenges a social informatics touch on old attacks S. Felix Wu University of California, Davis 16/5/2013IEEE Intelligence and Security."— Presentation transcript:

1 Cyber Security Challenges a social informatics touch on old attacks S. Felix Wu University of California, Davis 16/5/2013IEEE Intelligence and Security Informatics

2 2 Urgent! Please contact me! FROM:MR.CHEUNG PUI Hang Seng Bank Ltd Sai Wan Ho Branch 171 Shaukiwan Road Hong Kong. Please contact me on my personal box [puicheungcheungpui@yahoo.com] Let me start by introducing myself. I am Mr. Cheung Pui,director of operations of the Hang Seng Bank Ltd,Sai Wan Ho Branch. I have a obscured business suggestion for you. Before the U.S and Iraqi war our client Major Fadi Basem who was with the Iraqi forces and also business man made a numbered fixed deposit for 18 calendar months, with a value of Twenty Four millions Five Hundred Thousand United State Dollars only in my branch. Upon maturity several notice was sent to him,…

3 11/05/2009Davis Social Links @ Hong Kong University3

4 11/05/2009Davis Social Links @ Hong Kong University4 To me personally, this was a typical social spam.

5 11/05/2009Davis Social Links @ Hong Kong University5 Oops…

6 11/05/2009Davis Social Links @ Hong Kong University6 11/16 /2007 11/26 /2007 In my office 11/27 /2007 Spammed? 12/10 /2007 “Memoryless” For Felix Wu

7 IEEE Intelligence and Security Informatics OSN DSL/FAITH Policy/Reputation-based Route discovery Community Oriented Keywords Name-ID resolution Social Context FAITH over OSN Application Eric Felix Social-Enabled Applications and Games Existing Applications Wrapper Social network transformation tagging DSL  FAITH Emphasizing Trustworthiness in Social Informatics 6/5/20137

8 IEEE Intelligence and Security Informatics WillJohnAmy JustinFelix NancyMarySamTim Eric X-DSL 0x15EF2AC4 GENI geni 0.667 https://dslcore.slice1054.genislices.emulab.net/soemail/src/login.php 6/5/20138

9 908/16/2012Social Packets for Intel, Hillsboro, OR

10 6/5/2013IEEE Intelligence and Security Informatics10 Social Media Systems

11 Attacks leveraging Social Informatics 6/5/2013IEEE Intelligence and Security Informatics11

12 Socware Attacks leveraging Social Informatics 6/5/2013IEEE Intelligence and Security Informatics12

13 Social Media Systems But, they (attackers) can go much deeper! 6/5/2013IEEE Intelligence and Security Informatics13

14 Relationships & Structures 6/5/2013IEEE Intelligence and Security Informatics14

15 Applications 6/5/2013IEEE Intelligence and Security Informatics15 Justin EricFelix FB friends: 790+ FV neighbors: 30+ neighbor friend The “Add me please” push!!!

16 Social Interactions 16

17 Social Relationships and Structures Applications Social Interactions How much of you has been revealed and recorded? 6/5/2013IEEE Intelligence and Security Informatics17

18 Social Relationships and Structures Applications Social Interactions (Public Forums) How much of you has been revealed and recorded? 6/5/2013IEEE Intelligence and Security Informatics18

19 Public FB Discussions pages/groups: 880,664 posts: 18,618,481 comments: 150,430,423 likedby: 1,013,593,179 message_tags: 889,444 places: 4,735 shares: 8,924,826 story_tags: 102,943 fb_users: 116,388,463 6/5/2013IEEE Intelligence and Security Informatics19

20 6/5/2013IEEE Intelligence and Security Informatics20

21 21 Linguistic Features Cognitive Elements Affective Element

22 22 Occupy LA

23 23 Top 10%

24 6/5/2013IEEE Intelligence and Security Informatics24

25 Opinion Classification 25 http://www.facebook.com/occupyLA/posts/349187595101578

26 Time of Participation 6/5/2013IEEE Intelligence and Security Informatics26

27 11/05/2009Davis Social Links @ Hong Kong University27 The “attacker” can do a lot more now!

28 Challenges Cyber Attacks deeply leveraging Social Informatics Risk Assessment on Public Social Informatics Real-Time Analysis and Monitoring of Social Interactions Binding Social Informatics with Computation, Communication, and Information Flow 6/5/2013IEEE Intelligence and Security Informatics28

29 Samples of Social Sciences Bandwagon Effect, Information Cascade, Media Framing, Spiral of Silence, Goal Detection, Opinion Formation Social Structure, community development, Social Capitals Psychological Linguistics 6/5/2013IEEE Intelligence and Security Informatics29

30 6/5/2013IEEE Intelligence and Security Informatics30 November 6-12 of 2011 November 20-26 of 2011

31 And, of course,… 316/5/2013IEEE Intelligence and Security Informatics

32 32 http://sincere.se

33 6/5/2013IEEE Intelligence and Security Informatics33

34 Social Informatics 6/5/2013IEEE Intelligence and Security Informatics34 1. Social Relationship and Structures 2. Behavior 3. Influence among Content, Discussion and Community Formation  Partial Projection/Reflection of Real-life Human Relationship  Relationships established only via Online Interactions

35 Social Informatics But, they (attackers) can go much deeper! “We need to promote”, e.g., some fund raising activities – – On the subjects, you have deeply involved – Within the community, you have actively interacted with – And, your passion reveals much of yourself. 6/5/2013IEEE Intelligence and Security Informatics35

36 Challenges Social Informatics, Big Data Depth and Threat of Social Informatics Plane – It’s not just applications like Zynga’s Human + Cyber + Social Informatics – Future play ground for cyber security 6/5/2013IEEE Intelligence and Security Informatics36

37 6/5/2013IEEE Intelligence and Security Informatics37

38 Social Computing Leveraging Social Informatics within Computational Activities 6/5/2013IEEE Intelligence and Security Informatics38 Computing EntityInformation Entity RelationshipP ath Selection Social Entity Social Entity Systematic/Digitized

39 6/5/2013 Social-Centric OS Kernel Social Informatics 39IEEE Intelligence and Security Informatics

40 6/5/2013IEEE Intelligence and Security Informatics40 IPUPR. LYR. PAYLOADTCP/UDP HDR Attack Code Exploit (ReturnAddr) Decryption Code NOP System State Changes Focus on “Primitives” being used in the “Epsilon” phase!  Application dependent analysis

41 6/5/2013IEEE Intelligence and Security Informatics41

42 6/5/2013IEEE Intelligence and Security Informatics42


Download ppt "Cyber Security Challenges a social informatics touch on old attacks S. Felix Wu University of California, Davis 16/5/2013IEEE Intelligence and Security."

Similar presentations


Ads by Google