Cybercrime comes in all forms these days. One recent headline told of the creepware or silent computer snooping that resulted in the arrest of some 90 people in 19 countries. Miss Teen USA was among the victims. Her computer had been turned into a camera and used to spy on her in her own bedroom.
On the commercial front, Target suffered the largest retail hack in U.S. history during the Christmas shopping season of 2013, and now the Fortune 500 company's outlook is bleak with steep drops in profits.
Using a National Science CAREER Award grant, Virginia Tech College of Engineering Computer Scientist Daphne Yao and her colleagues have effectively shown how to isolate infected computer hosts and detect in advance stealthy malware also known as malicious software.
Credit: Virginia Tech
New research to be announced at the June 2014 ACM Symposium on Information, Computer and Communications Security http://asiaccs2014.nict.go.jp/ in Kyoto, Japan has unveiled the causal relations among computer network events. The work effectively isolates infected computer hosts and detects in advance stealthy malware also known as malicious software.
The work was conducted under the auspices of a 2010 National Science Foundation CAREER Award grant to develop software that differentiates human-user computer interaction from malware http://www.nsf.gov/awardsearch/showAward?AWD_ID=0953638&HistoricalAwards=false.
That $530,000 award was presented to Danfeng (Daphne) Yao, associate professor of computer science at Virginia Tech. She worked with Naren Ramakrishnan http://www.cs.vt.edu/user/ramakrishnan, the Thomas L. Phillips Professor of Engineering, and her graduate student Hao Zhang of Beijing, China, a doctoral candidate in computer science.
The Virginia Tech computer scientists used causal relations to determine whether or not network activities have justifiable and legitimate causes to occur.
"This type of semantic reasoning is new and very powerful," Yao said.
"The true significance of this security approach is its potential proactive defense capability. Conventional security systems scan for known attack patterns, which is reactive. Our anomaly detection based on enforcing benign properties in network traffic is a clear departure from that," Yao added.
They will present their paper "Detection of Stealthy Malware Activities with Trafﬁc Causality and Scalable Triggering Relation Discovery" on June 4. It will be published in the symposium's proceedings.
Virginia Tech Intellectual Property has filed a patent on this technology, and it is actually a continuation-in-part patent, following one of Yao's earlier patents.
Previously, Yao garnered a 3-year, $450,000 grant from the Office of Naval Research (ONR) on cyber security to quantitatively detect anomalies in Department of Defense (DOD) computers, mobile devices, command and control servers, and embedded systems deployed on navy ships.
Yao's career research focus has been on this methodology development for novel, practical, and quantitative anomaly detection. Specifically, she is analyzing causal relations of events and producing instructions for detecting anomalies in computer programs, systems, and networks.
Lynn Nystrom | Eurek Alert!
Engineers develop new methods to speed up simulations in computational grand challenge
27.03.2015 | University of California - San Diego
Sensor cable monitors fences of all kinds and can even detect low-level drone fly-bys
25.03.2015 | Universität des Saarlandes
In an experiment at the Department of Energy's SLAC National Accelerator Laboratory, scientists precisely measured the temperature and structure of aluminum as...
The IPH presents a solution at HANNOVER MESSE 2015 to make ship traffic more reliable while decreasing the maintenance costs at the same time. In cooperation with project partners, the research institute from Hannover, Germany, has developed a sensor system which continuously monitors the condition of the marine gearbox, thus preventing breakdowns. Special feature: the monitoring system works wirelessly and energy-autonomously. The required electrical power is generated where it is needed – directly at the sensor.
As well as cars need to be certified regularly (in Germany by the TÜV – Technical Inspection Association), ships need to be inspected – if the powertrain stops...
When an earthquake hits, the faster first responders can get to an impacted area, the more likely infrastructure--and lives--can be saved.
The Atlantic overturning is one of Earth’s most important heat transport systems, pumping warm water northwards and cold water southwards. Also known as the Gulf Stream system, it is responsible for the mild climate in northwestern Europe.
Scientists now found evidence for a slowdown of the overturning – multiple lines of observation suggest that in recent decades, the current system has been...
Because they are regularly subjected to heavy vehicle traffic, emissions, moisture and salt, above- and underground parking garages, as well as bridges, frequently experience large areas of corrosion. Most inspection systems to date have only been capable of inspecting smaller surface areas.
From April 13 to April 17 at the Hannover Messe (hall 2, exhibit booth C16), engineers from the Fraunhofer Institute for Nondestructive Testing IZFP will be...
25.03.2015 | Event News
19.03.2015 | Event News
17.03.2015 | Event News
27.03.2015 | Agricultural and Forestry Science
27.03.2015 | Materials Sciences
27.03.2015 | Ecology, The Environment and Conservation