Cybercrime comes in all forms these days. One recent headline told of the creepware or silent computer snooping that resulted in the arrest of some 90 people in 19 countries. Miss Teen USA was among the victims. Her computer had been turned into a camera and used to spy on her in her own bedroom.
On the commercial front, Target suffered the largest retail hack in U.S. history during the Christmas shopping season of 2013, and now the Fortune 500 company's outlook is bleak with steep drops in profits.
Using a National Science CAREER Award grant, Virginia Tech College of Engineering Computer Scientist Daphne Yao and her colleagues have effectively shown how to isolate infected computer hosts and detect in advance stealthy malware also known as malicious software.
Credit: Virginia Tech
New research to be announced at the June 2014 ACM Symposium on Information, Computer and Communications Security http://asiaccs2014.nict.go.jp/ in Kyoto, Japan has unveiled the causal relations among computer network events. The work effectively isolates infected computer hosts and detects in advance stealthy malware also known as malicious software.
The work was conducted under the auspices of a 2010 National Science Foundation CAREER Award grant to develop software that differentiates human-user computer interaction from malware http://www.nsf.gov/awardsearch/showAward?AWD_ID=0953638&HistoricalAwards=false.
That $530,000 award was presented to Danfeng (Daphne) Yao, associate professor of computer science at Virginia Tech. She worked with Naren Ramakrishnan http://www.cs.vt.edu/user/ramakrishnan, the Thomas L. Phillips Professor of Engineering, and her graduate student Hao Zhang of Beijing, China, a doctoral candidate in computer science.
The Virginia Tech computer scientists used causal relations to determine whether or not network activities have justifiable and legitimate causes to occur.
"This type of semantic reasoning is new and very powerful," Yao said.
"The true significance of this security approach is its potential proactive defense capability. Conventional security systems scan for known attack patterns, which is reactive. Our anomaly detection based on enforcing benign properties in network traffic is a clear departure from that," Yao added.
They will present their paper "Detection of Stealthy Malware Activities with Trafﬁc Causality and Scalable Triggering Relation Discovery" on June 4. It will be published in the symposium's proceedings.
Virginia Tech Intellectual Property has filed a patent on this technology, and it is actually a continuation-in-part patent, following one of Yao's earlier patents.
Previously, Yao garnered a 3-year, $450,000 grant from the Office of Naval Research (ONR) on cyber security to quantitatively detect anomalies in Department of Defense (DOD) computers, mobile devices, command and control servers, and embedded systems deployed on navy ships.
Yao's career research focus has been on this methodology development for novel, practical, and quantitative anomaly detection. Specifically, she is analyzing causal relations of events and producing instructions for detecting anomalies in computer programs, systems, and networks.
Lynn Nystrom | Eurek Alert!
Micropatterning OLEDs using electron beam technology
27.04.2016 | Fraunhofer-Institut für Organische Elektronik, Elektronenstrahl- und Plasmatechnik FEP
Quantum computing closer as RMIT drives towards first quantum data bus
18.04.2016 | RMIT University
Using an ultra fast-scanning atomic force microscope, a team of researchers from the University of Basel has filmed “living” nuclear pore complexes at work for the first time. Nuclear pores are molecular machines that control the traffic entering or exiting the cell nucleus. In their article published in Nature Nanotechnology, the researchers explain how the passage of unwanted molecules is prevented by rapidly moving molecular “tentacles” inside the pore.
Using high-speed AFM, Roderick Lim, Argovia Professor at the Biozentrum and the Swiss Nanoscience Institute of the University of Basel, has not only directly...
If a person pushes a broken-down car alone, there is a certain effect. If another person helps, the result is the sum of their efforts. If two micro-particles are pushing another microparticle, however, the resulting effect may not necessarily be the sum their efforts. A recent study published in Nature Communications, measured this odd effect that scientists call “many body.”
In the microscopic world, where the modern miniaturized machines at the new frontiers of technology operate, as long as we are in the presence of two...
Researchers from the Max Planck Institute Stuttgart have developed self-propelled tiny ‘microbots’ that can remove lead or organic pollution from contaminated water.
Working with colleagues in Barcelona and Singapore, Samuel Sánchez’s group used graphene oxide to make their microscale motors, which are able to adsorb lead...
Neutron scattering and computational modeling have revealed unique and unexpected behavior of water molecules under extreme confinement that is unmatched by any known gas, liquid or solid states.
In a paper published in Physical Review Letters, researchers at the Department of Energy's Oak Ridge National Laboratory describe a new tunneling state of...
Honeycomb structures as the basic building block for industrial applications presented using holo pyramid
Researchers of the Alfred Wegener Institute (AWI) will introduce their latest developments in the field of bionic lightweight design at Hannover Messe from 25...
27.04.2016 | Event News
15.04.2016 | Event News
12.04.2016 | Event News
04.05.2016 | Physics and Astronomy
04.05.2016 | Physics and Astronomy
04.05.2016 | Materials Sciences