Cybercrime comes in all forms these days. One recent headline told of the creepware or silent computer snooping that resulted in the arrest of some 90 people in 19 countries. Miss Teen USA was among the victims. Her computer had been turned into a camera and used to spy on her in her own bedroom.
On the commercial front, Target suffered the largest retail hack in U.S. history during the Christmas shopping season of 2013, and now the Fortune 500 company's outlook is bleak with steep drops in profits.
Using a National Science CAREER Award grant, Virginia Tech College of Engineering Computer Scientist Daphne Yao and her colleagues have effectively shown how to isolate infected computer hosts and detect in advance stealthy malware also known as malicious software.
Credit: Virginia Tech
New research to be announced at the June 2014 ACM Symposium on Information, Computer and Communications Security http://asiaccs2014.nict.go.jp/ in Kyoto, Japan has unveiled the causal relations among computer network events. The work effectively isolates infected computer hosts and detects in advance stealthy malware also known as malicious software.
The work was conducted under the auspices of a 2010 National Science Foundation CAREER Award grant to develop software that differentiates human-user computer interaction from malware http://www.nsf.gov/awardsearch/showAward?AWD_ID=0953638&HistoricalAwards=false.
That $530,000 award was presented to Danfeng (Daphne) Yao, associate professor of computer science at Virginia Tech. She worked with Naren Ramakrishnan http://www.cs.vt.edu/user/ramakrishnan, the Thomas L. Phillips Professor of Engineering, and her graduate student Hao Zhang of Beijing, China, a doctoral candidate in computer science.
The Virginia Tech computer scientists used causal relations to determine whether or not network activities have justifiable and legitimate causes to occur.
"This type of semantic reasoning is new and very powerful," Yao said.
"The true significance of this security approach is its potential proactive defense capability. Conventional security systems scan for known attack patterns, which is reactive. Our anomaly detection based on enforcing benign properties in network traffic is a clear departure from that," Yao added.
They will present their paper "Detection of Stealthy Malware Activities with Trafﬁc Causality and Scalable Triggering Relation Discovery" on June 4. It will be published in the symposium's proceedings.
Virginia Tech Intellectual Property has filed a patent on this technology, and it is actually a continuation-in-part patent, following one of Yao's earlier patents.
Previously, Yao garnered a 3-year, $450,000 grant from the Office of Naval Research (ONR) on cyber security to quantitatively detect anomalies in Department of Defense (DOD) computers, mobile devices, command and control servers, and embedded systems deployed on navy ships.
Yao's career research focus has been on this methodology development for novel, practical, and quantitative anomaly detection. Specifically, she is analyzing causal relations of events and producing instructions for detecting anomalies in computer programs, systems, and networks.
Lynn Nystrom | Eurek Alert!
Drones shown to make traffic crash site assessments safer, faster and more accurate
17.01.2019 | Purdue University
Next generation photonic memory devices are light-written, ultrafast and energy efficient
15.01.2019 | Eindhoven University of Technology
The scientific and political community alike stress the importance of German Antarctic research
Joint Press Release from the BMBF and AWI
The Antarctic is a frigid continent south of the Antarctic Circle, where researchers are the only inhabitants. Despite the hostile conditions, here the Alfred...
World first experiments on sensor that may revolutionise everything from medical devices to unmanned vehicles
The new sensor - capable of detecting vibrations of living cells - may revolutionise everything from medical devices to unmanned vehicles.
Dead and alive at the same time? Researchers at the Max Planck Institute of Quantum Optics have implemented Erwin Schrödinger’s paradoxical gedanken experiment employing an entangled atom-light state.
In 1935 Erwin Schrödinger formulated a thought experiment designed to capture the paradoxical nature of quantum physics. The crucial element of this gedanken...
Cellulose obtained from wood has amazing material properties. Empa researchers are now equipping the biodegradable material with additional functionalities to produce implants for cartilage diseases using 3D printing.
It all starts with an ear. Empa researcher Michael Hausmann removes the object shaped like a human ear from the 3D printer and explains:
The phenomenon of so-called superlubricity is known, but so far the explanation at the atomic level has been missing: for example, how does extremely low friction occur in bearings? Researchers from the Fraunhofer Institutes IWM and IWS jointly deciphered a universal mechanism of superlubricity for certain diamond-like carbon layers in combination with organic lubricants. Based on this knowledge, it is now possible to formulate design rules for supra lubricating layer-lubricant combinations. The results are presented in an article in Nature Communications, volume 10.
One of the most important prerequisites for sustainable and environmentally friendly mobility is minimizing friction. Research and industry have been dedicated...
16.01.2019 | Event News
14.01.2019 | Event News
12.12.2018 | Event News
18.01.2019 | Materials Sciences
18.01.2019 | Life Sciences
18.01.2019 | Health and Medicine