|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Attacks and defenses in decentralised botnets
If you have a question about this talk, please contact Eiko Yoneki.
As corporations, agencies, and individuals continue to invest in national infrastructure trusting it to withstand cyber-attacks, it is important to ensure that the this trust is warranted. In this talk, I will present ISP level countermeasures that localise bots based on the unique communication patterns arising from their overlay topologies used for command and control. I will also present schemes that allow ISPs to cooperatively detect botnet attacks and other network anomalies without leaking private traffic information. Experimental results on synthetic topologies embedded within Internet traffic traces from an ISP ’s backbone network indicate that our techniques (i) can localize the majority of bots with low false positive rate, (ii) are resilient to the partial visibility arising from partial deployment of monitoring systems, and measurement inaccuracies arising from partial visibility and dynamics of background traffic, and (iii) are scalable enough to show good promise as a key element of a wider network anomaly detection framework.
Motivation: http://www.guardian.co.uk/technology/blog/2009/mar/29/dalai-lama-china-malware The snooping dragon: Social malware surveillance of the Tibetan movement http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-746.pdf
Technical paper: http://www.usenix.org/event/sec10/tech/full_papers/Nagaraja.pdf
Bio: Shishir Nagaraja is a researcher in network security and privacy. He holds the position of a Lecturer at the University of Birmingham, as well as concurrent appointments as Adjunct Professor at the University of Illinois at Urbana-Champaign, USA and Assistant Professor at IIITD , India. He holds a PhD in Computer Security from the University of Cambridge. He has worked in the software industry for several years as a Software Engineer at Novell Bangalore. He holds several patents in the area of trust and security.
This talk is part of the Computer Laboratory Systems Research Group Seminar series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsHeritage Research Group Annual Fair Sir Richard Stone Annual Lecture Program verification reading group.
Other talksThe 2013 Stem Cells Discussion Forum: Working Towards Clinical Application Production Processes Group Seminar - "Advances in understanding inkjet fluids and jetting" Control of cytokinesis and the dark side of actomyosin forces Probing charge carriers in carbon materials with optical pulses Seminar by the recipients of the Lister Institute Research Prize 2012 Energy Project Finance : Oil & Gas