Defending against large-scale and coordinated attacks in the ubiquitous environments
conference contribution
posted on 2011-01-01, 00:00authored byYang Xiang
Ubiquitous computing is an exciting paradigm shift where technology becomes virtually invisible in our lives. In the increasingly interconnected world, threats to our daily lives can come from unexpected sources and universal directions. Criminals and terrorists have recognized the value of leveraging the ubiquitous computing environments to facilitate the commission of crimes. The cyber criminals typically launch different forms of large-scale and coordinated attacks, causing huge financial loss and potential life hazard. In this talk, we report two innovative approaches to defend against large-scale and coordinated attacks in the ubiquitous environments: 1) Inferring the cyber crime's intent through network traffic classification to enable the early warning of potential attacks, and 2) Profiling the large-scale and coordinated cyber attacks through both microscopic and macroscopic modeling to provide better control of such attacks. These approaches are effective in finding weak symptoms caused by the attacks thus can successfully defend against the large-scale and coordinated attacks at their early stages.
History
Event
International Conference on Trust, Security and Privacy in Computing and Communications (10th : 2011 : Changsha, China)
Pagination
7 - 8
Publisher
IEEE
Location
Changsha, China
Place of publication
[Changsha, China]
Start date
2011-11-16
End date
2011-11-18
ISBN-13
9781457721359
ISBN-10
145772135X
Language
eng
Publication classification
E1 Full written paper - refereed
Copyright notice
2011, IEEE
Title of proceedings
TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications