|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Attacks and defenses in decentralised botnets
If you have a question about this talk, please contact Eiko Yoneki.
As corporations, agencies, and individuals continue to invest in national infrastructure trusting it to withstand cyber-attacks, it is important to ensure that the this trust is warranted. In this talk, I will present ISP level countermeasures that localise bots based on the unique communication patterns arising from their overlay topologies used for command and control. I will also present schemes that allow ISPs to cooperatively detect botnet attacks and other network anomalies without leaking private traffic information. Experimental results on synthetic topologies embedded within Internet traffic traces from an ISP ’s backbone network indicate that our techniques (i) can localize the majority of bots with low false positive rate, (ii) are resilient to the partial visibility arising from partial deployment of monitoring systems, and measurement inaccuracies arising from partial visibility and dynamics of background traffic, and (iii) are scalable enough to show good promise as a key element of a wider network anomaly detection framework.
Motivation: http://www.guardian.co.uk/technology/blog/2009/mar/29/dalai-lama-china-malware The snooping dragon: Social malware surveillance of the Tibetan movement http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-746.pdf
Technical paper: http://www.usenix.org/event/sec10/tech/full_papers/Nagaraja.pdf
Bio: Shishir Nagaraja is a researcher in network security and privacy. He holds the position of a Lecturer at the University of Birmingham, as well as concurrent appointments as Adjunct Professor at the University of Illinois at Urbana-Champaign, USA and Assistant Professor at IIITD , India. He holds a PhD in Computer Security from the University of Cambridge. He has worked in the software industry for several years as a Software Engineer at Novell Bangalore. He holds several patents in the area of trust and security.
This talk is part of the Computer Laboratory Systems Research Group Seminar series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsPost-Slavery Societies Workshop REAL Centre Type the title of a new list here
Other talksMeeting on Testing and Verification for Computational Science POLIS Department Seminar - The Reconfiguration of the State Emerging Diseases: The Culture of Viruses Zebra stripes: testing old stories with new data Was geology the first science to inject history into the natural world? Power laws in dislocation plasticity