• DocumentCode
    2897334
  • Title

    Defending against Large-Scale and Coordinated Attacks in the Ubiquitous Environments

  • Author

    Xiang, Yang

  • Author_Institution
    Sch. of Inf. Technol., Deakin Univ., Melbourne, VIC, Australia
  • fYear
    2011
  • fDate
    16-18 Nov. 2011
  • Firstpage
    7
  • Lastpage
    8
  • Abstract
    Ubiquitous computing is an exciting paradigm shift where technology becomes virtually invisible in our lives. In the increasingly interconnected world, threats to our daily lives can come from unexpected sources and universal directions. Criminals and terrorists have recognized the value of leveraging the ubiquitous computing environments to facilitate the commission of crimes. The cybercriminals typically launch different forms of large-scale and coordinated attacks, causing huge financial loss and potential life hazard. In this talk, we report two innovative approaches to defend against large-scale and coordinated attacks in the ubiquitous environments: 1) Inferring the cybercrime´s intent through network traffic classification to enable the early warning of potential attacks; and 2) Profiling the large-scale and coordinated cyber attacks through both microscopic and macroscopic modeling to provide better control of such attacks. These approaches are effective in finding weak symptoms caused by the attacks thus can successfully defend against the large-scale and coordinated attacks at their early stages.
  • Keywords
    computer crime; computer network security; police data processing; terrorism; ubiquitous computing; coordinated cyber attacks; cybercriminals; financial loss; large-scale attacks; macroscopic modeling; microscopic modeling; network traffic classification; potential life hazard; terrorists; ubiquitous computing; Computational modeling; Computer crime; Computers; Conferences; Educational institutions; Microscopy; Ubiquitous computing; coordinated attacks; cybercrime; cybersecurity; large-scale attacks; security; ubiquitous computing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on
  • Conference_Location
    Changsha
  • Print_ISBN
    978-1-4577-2135-9
  • Type

    conf

  • DOI
    10.1109/TrustCom.2011.4
  • Filename
    6120796