Cybercrime comes in all forms these days. One recent headline told of the creepware or silent computer snooping that resulted in the arrest of some 90 people in 19 countries. Miss Teen USA was among the victims. Her computer had been turned into a camera and used to spy on her in her own bedroom.
On the commercial front, Target suffered the largest retail hack in U.S. history during the Christmas shopping season of 2013, and now the Fortune 500 company's outlook is bleak with steep drops in profits.
Using a National Science CAREER Award grant, Virginia Tech College of Engineering Computer Scientist Daphne Yao and her colleagues have effectively shown how to isolate infected computer hosts and detect in advance stealthy malware also known as malicious software.
Credit: Virginia Tech
New research to be announced at the June 2014 ACM Symposium on Information, Computer and Communications Security http://asiaccs2014.nict.go.jp/ in Kyoto, Japan has unveiled the causal relations among computer network events. The work effectively isolates infected computer hosts and detects in advance stealthy malware also known as malicious software.
The work was conducted under the auspices of a 2010 National Science Foundation CAREER Award grant to develop software that differentiates human-user computer interaction from malware http://www.nsf.gov/awardsearch/showAward?AWD_ID=0953638&HistoricalAwards=false.
That $530,000 award was presented to Danfeng (Daphne) Yao, associate professor of computer science at Virginia Tech. She worked with Naren Ramakrishnan http://www.cs.vt.edu/user/ramakrishnan, the Thomas L. Phillips Professor of Engineering, and her graduate student Hao Zhang of Beijing, China, a doctoral candidate in computer science.
The Virginia Tech computer scientists used causal relations to determine whether or not network activities have justifiable and legitimate causes to occur.
"This type of semantic reasoning is new and very powerful," Yao said.
"The true significance of this security approach is its potential proactive defense capability. Conventional security systems scan for known attack patterns, which is reactive. Our anomaly detection based on enforcing benign properties in network traffic is a clear departure from that," Yao added.
They will present their paper "Detection of Stealthy Malware Activities with Trafﬁc Causality and Scalable Triggering Relation Discovery" on June 4. It will be published in the symposium's proceedings.
Virginia Tech Intellectual Property has filed a patent on this technology, and it is actually a continuation-in-part patent, following one of Yao's earlier patents.
Previously, Yao garnered a 3-year, $450,000 grant from the Office of Naval Research (ONR) on cyber security to quantitatively detect anomalies in Department of Defense (DOD) computers, mobile devices, command and control servers, and embedded systems deployed on navy ships.
Yao's career research focus has been on this methodology development for novel, practical, and quantitative anomaly detection. Specifically, she is analyzing causal relations of events and producing instructions for detecting anomalies in computer programs, systems, and networks.
Lynn Nystrom | Eurek Alert!
Hey robot, shimmy like a centipede
22.07.2016 | Kyoto University
New nanoscale technologies could revolutionize microscopes, study of disease
20.07.2016 | University of Missouri-Columbia
Munich Physicists have developed a novel electron microscope that can visualize electromagnetic fields oscillating at frequencies of billions of cycles per second.
Temporally varying electromagnetic fields are the driving force behind the whole of electronics. Their polarities can change at mind-bogglingly fast rates, and...
Breakup of continents with two speed: Continents initially stretch very slowly along the future splitting zone, but then move apart very quickly before the onset of rupture. The final speed can be up to 20 times faster than in the first, slow extension phase.phases
Present-day continents were shaped hundreds of millions of years ago as the supercontinent Pangaea broke apart. Derived from Pangaea’s main fragments Gondwana...
Scaffolding and specialised workers help with the delivery – Heidelberg biochemists gain new insights into biogenesis
A type of scaffolding on which specialised workers ply their trade helps in the manufacturing process of the two subunits from which the ribosome – the protein...
Scientists at the Helmholtz Zentrum München have developed a new mass spectrometry imaging method which, for the first time, makes it possible to analyze hundreds of metabolites in fixed tissue samples. Their findings, published in the journal Nature Protocols, explain the new access to metabolic information, which will offer previously unexploited potential for tissue-based research and molecular diagnostics.
In biomedical research, working with tissue samples is indispensable because it permits insights into the biological reality of patients, for example, in...
Chemists at the University of Basel have succeeded in using computer simulations to elucidate transient structures in proteins. In the journal Angewandte Chemie, the researchers set out how computer simulations of details at the atomic level can be used to understand proteins’ modes of action.
Using computational chemistry, it is possible to characterize the motion of individual atoms of a molecule. Today, the latest simulation techniques allow...
15.07.2016 | Event News
15.07.2016 | Event News
11.07.2016 | Event News
22.07.2016 | Information Technology
22.07.2016 | Physics and Astronomy
22.07.2016 | Life Sciences