* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Do you know someone may be watching you?
Survey
Document related concepts
Storm botnet wikipedia , lookup
Cryptanalysis wikipedia , lookup
Cyberwarfare wikipedia , lookup
Antivirus software wikipedia , lookup
Wireless security wikipedia , lookup
Cyber-security regulation wikipedia , lookup
Post-quantum cryptography wikipedia , lookup
Security-focused operating system wikipedia , lookup
Cryptography wikipedia , lookup
Microsoft Security Essentials wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Cyberattack wikipedia , lookup
Social engineering (security) wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Computer security wikipedia , lookup
Transcript
Wilber R. Rivas Del Rio High School San Felipe Del Rio CISD Dr. Guofei Gu Director of SUCCESS laboratory Secure Communication and Computer Systems Computer Science & Engineering Identifying sources that are hacking into your system by using various techniques in computer science and mathematics. To solve practical security problems ◦ networking and system techniques ◦ applied cryptography ◦ machine learning ◦ probability/statistics ◦ information theory ◦ graph theory Assistant professor in the Department of Computer Science & Engineering PhD Georgia Tech, 2008 Automated collection and analysis of webbased bot malware infections Interests include all aspects of network and system security. ◦ ◦ ◦ ◦ Internet malware detection, defense, and analysis Intrusion detection and anomaly detections Network security Web and social networking security Short for malicious software, consists of programming (code, scripts, active content, and other software) Loss of privacy In malware, a botnet is a collection of infected computers or bots Secret writing Ciphertext The conversion of information from a readable state to apparent nonsense ◦ ATM cards ◦ Computer passwords Technique A branch of artificial intelligence Design and development of algorithms Recognize complex patterns Bachelors degree in Computer Science PhD student ◦ Intrusion detection systems for enterprises ◦ Design graph related algorithms to detect abnormal traffic PhD student Wireless Network Security ◦ Detect Rogue Access Point Online Social Networking Website Security ◦ Detect malicious/spam accounts ◦ Analyze cyber criminal ecosystem Chao Yang, Robert Harkreader, Guofei Gu. "Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers." To appear in Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection (RAID 2011), Malware Analysis How to categorize malware and what they do Static analysis and dynamic analysis of malware Malware encryption and decryption Malware detection Communicating securely over an insecure channel Computer Network Security Cryptography Mathematics Encryption and Decryption of data Encryption function ◦ E(P)=C Decryption Function ◦ D(C)=P ◦ Inverse functions D(E(P)) = P and E(D(C)) = C