DocumentCode :
2897334
Title :
Defending against Large-Scale and Coordinated Attacks in the Ubiquitous Environments
Author :
Xiang, Yang
Author_Institution :
Sch. of Inf. Technol., Deakin Univ., Melbourne, VIC, Australia
fYear :
2011
fDate :
16-18 Nov. 2011
Firstpage :
7
Lastpage :
8
Abstract :
Ubiquitous computing is an exciting paradigm shift where technology becomes virtually invisible in our lives. In the increasingly interconnected world, threats to our daily lives can come from unexpected sources and universal directions. Criminals and terrorists have recognized the value of leveraging the ubiquitous computing environments to facilitate the commission of crimes. The cybercriminals typically launch different forms of large-scale and coordinated attacks, causing huge financial loss and potential life hazard. In this talk, we report two innovative approaches to defend against large-scale and coordinated attacks in the ubiquitous environments: 1) Inferring the cybercrime´s intent through network traffic classification to enable the early warning of potential attacks; and 2) Profiling the large-scale and coordinated cyber attacks through both microscopic and macroscopic modeling to provide better control of such attacks. These approaches are effective in finding weak symptoms caused by the attacks thus can successfully defend against the large-scale and coordinated attacks at their early stages.
Keywords :
computer crime; computer network security; police data processing; terrorism; ubiquitous computing; coordinated cyber attacks; cybercriminals; financial loss; large-scale attacks; macroscopic modeling; microscopic modeling; network traffic classification; potential life hazard; terrorists; ubiquitous computing; Computational modeling; Computer crime; Computers; Conferences; Educational institutions; Microscopy; Ubiquitous computing; coordinated attacks; cybercrime; cybersecurity; large-scale attacks; security; ubiquitous computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on
Conference_Location :
Changsha
Print_ISBN :
978-1-4577-2135-9
Type :
conf
DOI :
10.1109/TrustCom.2011.4
Filename :
6120796
Link To Document :
بازگشت