Forum for Science, Industry and Business

Sponsored by:     3M 
Search our Site:

 

New proactive approach unveiled to malware in networked computers and data

04.06.2014

Cybercrime comes in all forms these days. One recent headline told of the creepware or silent computer snooping that resulted in the arrest of some 90 people in 19 countries. Miss Teen USA was among the victims. Her computer had been turned into a camera and used to spy on her in her own bedroom.

On the commercial front, Target suffered the largest retail hack in U.S. history during the Christmas shopping season of 2013, and now the Fortune 500 company's outlook is bleak with steep drops in profits.


Using a National Science CAREER Award grant, Virginia Tech College of Engineering Computer Scientist Daphne Yao and her colleagues have effectively shown how to isolate infected computer hosts and detect in advance stealthy malware also known as malicious software.

Credit: Virginia Tech

New research to be announced at the June 2014 ACM Symposium on Information, Computer and Communications Security http://asiaccs2014.nict.go.jp/ in Kyoto, Japan has unveiled the causal relations among computer network events. The work effectively isolates infected computer hosts and detects in advance stealthy malware also known as malicious software.

The work was conducted under the auspices of a 2010 National Science Foundation CAREER Award grant to develop software that differentiates human-user computer interaction from malware http://www.nsf.gov/awardsearch/showAward?AWD_ID=0953638&HistoricalAwards=false.

That $530,000 award was presented to Danfeng (Daphne) Yao, associate professor of computer science at Virginia Tech. She worked with Naren Ramakrishnan http://www.cs.vt.edu/user/ramakrishnan, the Thomas L. Phillips Professor of Engineering, and her graduate student Hao Zhang of Beijing, China, a doctoral candidate in computer science.

The Virginia Tech computer scientists used causal relations to determine whether or not network activities have justifiable and legitimate causes to occur.

"This type of semantic reasoning is new and very powerful," Yao said.

"The true significance of this security approach is its potential proactive defense capability. Conventional security systems scan for known attack patterns, which is reactive. Our anomaly detection based on enforcing benign properties in network traffic is a clear departure from that," Yao added.

They will present their paper "Detection of Stealthy Malware Activities with Traffic Causality and Scalable Triggering Relation Discovery" on June 4. It will be published in the symposium's proceedings.

Virginia Tech Intellectual Property has filed a patent on this technology, and it is actually a continuation-in-part patent, following one of Yao's earlier patents.

Previously, Yao garnered a 3-year, $450,000 grant from the Office of Naval Research (ONR) on cyber security to quantitatively detect anomalies in Department of Defense (DOD) computers, mobile devices, command and control servers, and embedded systems deployed on navy ships.

Yao's career research focus has been on this methodology development for novel, practical, and quantitative anomaly detection. Specifically, she is analyzing causal relations of events and producing instructions for detecting anomalies in computer programs, systems, and networks.

Lynn Nystrom | Eurek Alert!

More articles from Information Technology:

nachricht Simulation and Virtual Reality: Virtual Trade Fair Tour on the Smartphone
27.04.2015 | Siemens AG

nachricht A silver lining
24.04.2015 | University of California - Santa Barbara

All articles from Information Technology >>>

The most recent press releases about innovation >>>

Die letzten 5 Focus-News des innovations-reports im Überblick:

Im Focus: Fast and Accurate 3-D Imaging Technique to Track Optically-Trapped Particles

KAIST researchers published an article on the development of a novel technique to precisely track the 3-D positions of optically-trapped particles having complicated geometry in high speed in the April 2015 issue of Optica.

Daejeon, Republic of Korea, April 23, 2015--Optical tweezers have been used as an invaluable tool for exerting micro-scale force on microscopic particles and...

Im Focus: NOAA, Tulane identify second possible specimen of 'pocket shark' ever found

Pocket sharks are among the world's rarest finds

A very small and rare species of shark is swimming its way through scientific literature. But don't worry, the chances of this inches-long vertebrate biting...

Im Focus: Drexel materials scientists putting a new spin on computing memory

Ever since computers have been small enough to be fixtures on desks and laps, their central processing has functioned something like an atomic Etch A Sketch, with electromagnetic fields pushing data bits into place to encode data.

Unfortunately, the same drawbacks and perils of the mechanical sketch board have been just as pervasive in computing: making a change often requires starting...

Im Focus: Exploding stars help to understand thunderclouds on Earth

How is lightning initiated in thunderclouds? This is difficult to answer - how do you measure electric fields inside large, dangerously charged clouds? It was discovered, more or less by coincidence, that cosmic rays provide suitable probes to measure electric fields within thunderclouds. This surprising finding is published in Physical Review Letters on April 24th. The measurements were performed with the LOFAR radio telescope located in the Netherlands.

How is lightning initiated in thunderclouds? This is difficult to answer - how do you measure electric fields inside large, dangerously charged clouds? It was...

Im Focus: On the trail of a trace gas

Max Planck researcher Buhalqem Mamtimin determines how much nitrogen oxide is released into the atmosphere from agriculturally used oases.

In order to make statements about current and future air pollution, scientists use models which simulate the Earth’s atmosphere. A lot of information such as...

All Focus news of the innovation-report >>>

Anzeige

Anzeige

Event News

HHL Energy Conference on May 11/12, 2015: Students Discuss about Decentralized Energy

23.04.2015 | Event News

“Developing our cities, preserving our planet”: Nobel Laureates gather for the first time in Asia

23.04.2015 | Event News

HHL's Entrepreneurship Conference on FinTech

13.04.2015 | Event News

 
Latest News

Strong Evidence – New Insight in Muscle Function

27.04.2015 | Life Sciences

The Future of Oil and Gas: Last of Her Kind

27.04.2015 | Power and Electrical Engineering

Tiny Lab Devices Could Attack Huge Problem of Drug-Resistant Infections

27.04.2015 | Life Sciences

VideoLinks
B2B-VideoLinks
More VideoLinks >>>