COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Wednesday Seminars - Department of Computer Science and Technology > Searching for Evil
Searching for EvilAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Timothy G. Griffin. (work with Tyler Moore and Shishir Nagaraja) Computer security has recently imported a lot of ideas from economics, psychology and sociology, leading to fresh insights and new tools. We will describe one thread of research that draws together techniques from fields as diverse as signals intelligence and sociology to search for artificial communities. Evildoers online divide roughly into two categories – those who don’t want their websites to be found, such as phishermen, and those who do. The latter category runs from fake escrow sites through dodgy stores to postmodern Ponzi schemes. A few of them buy ads, but many set up fake communities in the hope of having victims driven to their sites for free. How can these reputation thieves be detected? Some of our work in security economics and social networking may give an insight into the practical effects of network topology. These tie up in various ways with traffic analysis, long used by the signals intelligence agencies which trawl the airwaves and networks looking for interesting targets. We’ll describe a number of dubious business enterprises we’ve unearthed. Recent advances in algorithms, such as Newman’s modularity matrix, have increased the robustness of covert community detection. But much scope remains for wrongdoers to hide themselves better as they become topologically aware; we can expect attack and defence to go through several rounds of coevolution. We’ll therefore end up by talking about some strategic issues, such as the extent to which search engines and other service providers could, or should, share information in the interests of wickedness detection. (This talk was given as a google tech talk in August 2007 and is here) This talk is part of the Wednesday Seminars - Department of Computer Science and Technology series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsBeyond i.i.d. in Information Theory Work Shop St Catharine's Lecture Series Engineering Design Centre SeminarsOther talksAnimal Migration Roland the Hero Description: Olfaction of biologically relevant vapors by secondary electrospray ionization mass spectrometry Atmospheric Structure Revealed by Refraction of Routine Radio Transmissions from Civil Aircraft. Systems for Big Data Applications:Revolutionising personal computing Imaging techniques and novel tools for early detection and intervention Protein Folding, Evolution and Interactions Symposium "Mechanosensitive regulation of cancer epigenetics and pluripotency" Protein Folding, Evolution and Interactions Symposium Single Cell Seminars (November) Mechanical properties of cells or cell components on the micro- and nanometer scale |