Title :
Defending against Large-Scale and Coordinated Attacks in the Ubiquitous Environments
Author_Institution :
Sch. of Inf. Technol., Deakin Univ., Melbourne, VIC, Australia
Abstract :
Ubiquitous computing is an exciting paradigm shift where technology becomes virtually invisible in our lives. In the increasingly interconnected world, threats to our daily lives can come from unexpected sources and universal directions. Criminals and terrorists have recognized the value of leveraging the ubiquitous computing environments to facilitate the commission of crimes. The cybercriminals typically launch different forms of large-scale and coordinated attacks, causing huge financial loss and potential life hazard. In this talk, we report two innovative approaches to defend against large-scale and coordinated attacks in the ubiquitous environments: 1) Inferring the cybercrime´s intent through network traffic classification to enable the early warning of potential attacks; and 2) Profiling the large-scale and coordinated cyber attacks through both microscopic and macroscopic modeling to provide better control of such attacks. These approaches are effective in finding weak symptoms caused by the attacks thus can successfully defend against the large-scale and coordinated attacks at their early stages.
Keywords :
computer crime; computer network security; police data processing; terrorism; ubiquitous computing; coordinated cyber attacks; cybercriminals; financial loss; large-scale attacks; macroscopic modeling; microscopic modeling; network traffic classification; potential life hazard; terrorists; ubiquitous computing; Computational modeling; Computer crime; Computers; Conferences; Educational institutions; Microscopy; Ubiquitous computing; coordinated attacks; cybercrime; cybersecurity; large-scale attacks; security; ubiquitous computing;
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on
Conference_Location :
Changsha
Print_ISBN :
978-1-4577-2135-9
DOI :
10.1109/TrustCom.2011.4