Cybercrime comes in all forms these days. One recent headline told of the creepware or silent computer snooping that resulted in the arrest of some 90 people in 19 countries. Miss Teen USA was among the victims. Her computer had been turned into a camera and used to spy on her in her own bedroom.
On the commercial front, Target suffered the largest retail hack in U.S. history during the Christmas shopping season of 2013, and now the Fortune 500 company's outlook is bleak with steep drops in profits.
Using a National Science CAREER Award grant, Virginia Tech College of Engineering Computer Scientist Daphne Yao and her colleagues have effectively shown how to isolate infected computer hosts and detect in advance stealthy malware also known as malicious software.
Credit: Virginia Tech
New research to be announced at the June 2014 ACM Symposium on Information, Computer and Communications Security http://asiaccs2014.nict.go.jp/ in Kyoto, Japan has unveiled the causal relations among computer network events. The work effectively isolates infected computer hosts and detects in advance stealthy malware also known as malicious software.
The work was conducted under the auspices of a 2010 National Science Foundation CAREER Award grant to develop software that differentiates human-user computer interaction from malware http://www.nsf.gov/awardsearch/showAward?AWD_ID=0953638&HistoricalAwards=false.
That $530,000 award was presented to Danfeng (Daphne) Yao, associate professor of computer science at Virginia Tech. She worked with Naren Ramakrishnan http://www.cs.vt.edu/user/ramakrishnan, the Thomas L. Phillips Professor of Engineering, and her graduate student Hao Zhang of Beijing, China, a doctoral candidate in computer science.
The Virginia Tech computer scientists used causal relations to determine whether or not network activities have justifiable and legitimate causes to occur.
"This type of semantic reasoning is new and very powerful," Yao said.
"The true significance of this security approach is its potential proactive defense capability. Conventional security systems scan for known attack patterns, which is reactive. Our anomaly detection based on enforcing benign properties in network traffic is a clear departure from that," Yao added.
They will present their paper "Detection of Stealthy Malware Activities with Trafﬁc Causality and Scalable Triggering Relation Discovery" on June 4. It will be published in the symposium's proceedings.
Virginia Tech Intellectual Property has filed a patent on this technology, and it is actually a continuation-in-part patent, following one of Yao's earlier patents.
Previously, Yao garnered a 3-year, $450,000 grant from the Office of Naval Research (ONR) on cyber security to quantitatively detect anomalies in Department of Defense (DOD) computers, mobile devices, command and control servers, and embedded systems deployed on navy ships.
Yao's career research focus has been on this methodology development for novel, practical, and quantitative anomaly detection. Specifically, she is analyzing causal relations of events and producing instructions for detecting anomalies in computer programs, systems, and networks.
Lynn Nystrom | Eurek Alert!
NASA's ICESat-2 equipped with unique 3-D manufactured part
03.02.2016 | NASA/Goddard Space Flight Center
Energy-saving minicomputers for the ‘Internet of Things’
29.01.2016 | Helmholtz-Zentrum Dresden-Rossendorf
Automobiles increase the mobility of their users. However, their maneuverability is pushed to the limit by cramped inner city conditions. Those who need to...
Advance in biomedical imaging: The University of Würzburg's Biocenter has enhanced fluorescence microscopy to label and visualise up to nine different cell structures simultaneously.
Fluorescence microscopy allows researchers to visualise biomolecules in cells. They label the molecules using fluorescent probes, excite them with light and...
NASA's follow-on to the successful ICESat mission will employ a never-before-flown technique for determining the topography of ice sheets and the thickness of sea ice, but that won't be the only first for this mission.
Slated for launch in 2018, NASA's Ice, Cloud and land Elevation Satellite-2 (ICESat-2) also will carry a 3-D printed part made of polyetherketoneketone (PEKK),...
In the last decades, sea level has been rising continuously – about 3.3 mm per year. For reef islands such as the Maldives or the Marshall Islands a sinister picture is being painted evoking the demise of the island states and their cultures. Are the effects of sea-level rise already noticeable on reef islands? Scientists from the ZMT have now answered this question for the Takuu Atoll, a group of Pacific islands, located northeast of Papua New Guinea.
In the last decades, sea level has been rising continuously – about 3.3 mm per year. For reef islands such as the Maldives or the Marshall Islands a sinister...
The ‘Internet of Things’ is growing rapidly. Mobile phones, washing machines and the milk bottle in the fridge: the idea is that minicomputers connected to these will be able to process information, receive and send data. This requires electrical power. Transistors that are capable of switching information with a single electron use far less power than field effect transistors that are commonly used in computers. However, these innovative electronic switches do not yet work at room temperature. Scientists working on the new EU research project ‘Ions4Set’ intend to change this. The program will be launched on February 1. It is coordinated by the Helmholtz-Zentrum Dresden-Rossendorf (HZDR).
“Billions of tiny computers will in future communicate with each other via the Internet or locally. Yet power consumption currently remains a great obstacle”,...
02.02.2016 | Event News
26.01.2016 | Event News
26.01.2016 | Event News
05.02.2016 | Life Sciences
05.02.2016 | Materials Sciences
05.02.2016 | Physics and Astronomy