COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Computer Laboratory Systems Research Group Seminar > Attacks and defenses in decentralised botnets
Attacks and defenses in decentralised botnetsAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Eiko Yoneki. As corporations, agencies, and individuals continue to invest in national infrastructure trusting it to withstand cyber-attacks, it is important to ensure that the this trust is warranted. In this talk, I will present ISP level countermeasures that localise bots based on the unique communication patterns arising from their overlay topologies used for command and control. I will also present schemes that allow ISPs to cooperatively detect botnet attacks and other network anomalies without leaking private traffic information. Experimental results on synthetic topologies embedded within Internet traffic traces from an ISP ’s backbone network indicate that our techniques (i) can localize the majority of bots with low false positive rate, (ii) are resilient to the partial visibility arising from partial deployment of monitoring systems, and measurement inaccuracies arising from partial visibility and dynamics of background traffic, and (iii) are scalable enough to show good promise as a key element of a wider network anomaly detection framework. Motivation: http://www.guardian.co.uk/technology/blog/2009/mar/29/dalai-lama-china-malware The snooping dragon: Social malware surveillance of the Tibetan movement http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-746.pdf Technical paper: http://www.usenix.org/event/sec10/tech/full_papers/Nagaraja.pdf Bio: Shishir Nagaraja is a researcher in network security and privacy. He holds the position of a Lecturer at the University of Birmingham, as well as concurrent appointments as Adjunct Professor at the University of Illinois at Urbana-Champaign, USA and Assistant Professor at IIITD , India. He holds a PhD in Computer Security from the University of Cambridge. He has worked in the software industry for several years as a Software Engineer at Novell Bangalore. He holds several patents in the area of trust and security. This talk is part of the Computer Laboratory Systems Research Group Seminar series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsESRC Doctoral Training Centre Cambridge University Bahá'í Society 2016 listsOther talksThermodynamics de-mystified? /Thermodynamics without Ansätze? Embedding Musical Codes into an Interactive Piano Composition Developing an optimisation algorithm to supervise active learning in drug discovery Wetting and elasticity: 2 experimental illustrations From ‘Do Not Touch’ signs to barriers: can we successfully provide access without compromising preservation principles? MOVED TO 28 JUNE 2018 It takes two to tango:platelet collagen receptor GPVI-dimer in thrombosis and clinical implications A rose by any other name 'Cambridge University, Past and Present' To be confirmed 'Politics in Uncertain Times: What will the world look like in 2050 and how do you know? The role of myosin VI in connexin 43 gap junction accretion Designer Babies or Children of Frankenstein? Genome Editing and its Side Effects |