Download Do you know someone may be watching you?

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Storm botnet wikipedia , lookup

Cryptanalysis wikipedia , lookup

Cyberwarfare wikipedia , lookup

Antivirus software wikipedia , lookup

Wireless security wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Post-quantum cryptography wikipedia , lookup

Security-focused operating system wikipedia , lookup

Cryptography wikipedia , lookup

Microsoft Security Essentials wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Cyberattack wikipedia , lookup

Social engineering (security) wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Cybercrime wikipedia , lookup

Computer security wikipedia , lookup

Mobile security wikipedia , lookup

Malware wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
Wilber R. Rivas
Del Rio High School
San Felipe Del Rio CISD
Dr. Guofei Gu
Director of SUCCESS laboratory
Secure Communication and Computer Systems
Computer Science & Engineering
 Identifying
sources that are
hacking into your system by
using various techniques in
computer science and
mathematics.
 To
solve practical security
problems
◦ networking and system techniques
◦ applied cryptography
◦ machine learning
◦ probability/statistics
◦ information theory
◦ graph theory


Assistant professor in the Department
of Computer Science & Engineering
PhD Georgia Tech, 2008


Automated collection and analysis of webbased bot malware infections
Interests include all aspects of network and
system security.
◦
◦
◦
◦
Internet malware detection, defense, and analysis
Intrusion detection and anomaly detections
Network security
Web and social networking security

Short for malicious software,
consists of programming
(code, scripts, active content,
and other software)
 Loss
of privacy
In malware, a botnet is
a collection of infected
computers or bots

Secret writing

Ciphertext

The conversion of information from a
readable state to apparent nonsense
◦ ATM cards
◦ Computer passwords

Technique

A branch of artificial intelligence

Design and development of algorithms

Recognize complex patterns

Bachelors degree in Computer Science

PhD student
◦ Intrusion detection systems for enterprises
◦ Design graph related algorithms to detect abnormal
traffic

PhD student

Wireless Network Security
◦ Detect Rogue Access Point

Online Social Networking Website Security
◦ Detect malicious/spam accounts
◦ Analyze cyber criminal ecosystem

Chao Yang, Robert Harkreader, Guofei Gu.
"Die Free or Live Hard? Empirical
Evaluation and New Design for
Fighting Evolving Twitter
Spammers."
To appear in Proceedings of the 14th International Symposium
on Recent Advances in Intrusion Detection
(RAID 2011),

Malware Analysis

How to categorize malware and what they do

Static analysis and dynamic analysis of
malware
Malware encryption and decryption

Malware detection


Communicating securely over an insecure
channel
 Computer
Network Security
 Cryptography
 Mathematics
 Encryption and Decryption of data
Encryption function
◦ E(P)=C
Decryption Function
◦ D(C)=P
◦ Inverse functions
 D(E(P)) = P and E(D(C)) = C
