|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Attacks and defenses in decentralised botnets
If you have a question about this talk, please contact Eiko Yoneki.
As corporations, agencies, and individuals continue to invest in national infrastructure trusting it to withstand cyber-attacks, it is important to ensure that the this trust is warranted. In this talk, I will present ISP level countermeasures that localise bots based on the unique communication patterns arising from their overlay topologies used for command and control. I will also present schemes that allow ISPs to cooperatively detect botnet attacks and other network anomalies without leaking private traffic information. Experimental results on synthetic topologies embedded within Internet traffic traces from an ISP ’s backbone network indicate that our techniques (i) can localize the majority of bots with low false positive rate, (ii) are resilient to the partial visibility arising from partial deployment of monitoring systems, and measurement inaccuracies arising from partial visibility and dynamics of background traffic, and (iii) are scalable enough to show good promise as a key element of a wider network anomaly detection framework.
Motivation: http://www.guardian.co.uk/technology/blog/2009/mar/29/dalai-lama-china-malware The snooping dragon: Social malware surveillance of the Tibetan movement http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-746.pdf
Technical paper: http://www.usenix.org/event/sec10/tech/full_papers/Nagaraja.pdf
Bio: Shishir Nagaraja is a researcher in network security and privacy. He holds the position of a Lecturer at the University of Birmingham, as well as concurrent appointments as Adjunct Professor at the University of Illinois at Urbana-Champaign, USA and Assistant Professor at IIITD , India. He holds a PhD in Computer Security from the University of Cambridge. He has worked in the software industry for several years as a Software Engineer at Novell Bangalore. He holds several patents in the area of trust and security.
This talk is part of the Computer Laboratory Systems Research Group Seminar series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsRECOUP open seminar series FRESCO Talks Early Detection Forum
Other talksThe art of sex: genetic exchange in Trypanosoma brucei within the tsetse fly Professor Mick Tuite - Title tbc Motion filtering: Marshalling, steering and sorting Triggering of the largest Deccan eruptions by the Chicxulub impact OR What really killed the dinosaurs? "Addressing missingness using two-phase sampling for nonresponse: methods and benefits" What keeps the Earth habitable?