Defending against large-scale and coordinated attacks in the ubiquitous environments

Xiang, Yang 2011, Defending against large-scale and coordinated attacks in the ubiquitous environments, in TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, [Changsha, China], pp. 7-8.

Attached Files
Name Description MIMEType Size Downloads

Title Defending against large-scale and coordinated attacks in the ubiquitous environments
Author(s) Xiang, Yang
Conference name International Conference on Trust, Security and Privacy in Computing and Communications (10th : 2011 : Changsha, China)
Conference location Changsha, China
Conference dates 16-18 Nov. 2011
Title of proceedings TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications
Editor(s) [Unknown]
Publication date 2011
Conference series IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Start page 7
End page 8
Publisher IEEE
Place of publication [Changsha, China]
Keyword(s) security
large-scale attacks
coordinated attacks
ubiquitous computing
cybersecurity
cybercrime
Summary Ubiquitous computing is an exciting paradigm shift where technology becomes virtually invisible in our lives. In the increasingly interconnected world, threats to our daily lives can come from unexpected sources and universal directions. Criminals and terrorists have recognized the value of leveraging the ubiquitous computing environments to facilitate the commission of crimes. The cyber criminals typically launch different forms of large-scale and coordinated attacks, causing huge financial loss and potential life hazard. In this talk, we report two innovative approaches to defend against large-scale and coordinated attacks in the ubiquitous environments: 1) Inferring the cyber crime's intent through network traffic classification to enable the early warning of potential attacks, and 2) Profiling the large-scale and coordinated cyber attacks through both microscopic and macroscopic modeling to provide better control of such attacks. These approaches are effective in finding weak symptoms caused by the attacks thus can successfully defend against the large-scale and coordinated attacks at their early stages.
ISBN 145772135X
9781457721359
Language eng
Field of Research 080503 Networking and Communications
Socio Economic Objective 890201 Application Software Packages (excl. Computer Games)
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2011, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30042395

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 56 Abstract Views, 8 File Downloads  -  Detailed Statistics
Created: Tue, 14 Feb 2012, 15:47:30 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.