Deakin University
Browse

File(s) under permanent embargo

Defending against large-scale and coordinated attacks in the ubiquitous environments

conference contribution
posted on 2011-01-01, 00:00 authored by Yang Xiang
Ubiquitous computing is an exciting paradigm shift where technology becomes virtually invisible in our lives. In the increasingly interconnected world, threats to our daily lives can come from unexpected sources and universal directions. Criminals and terrorists have recognized the value of leveraging the ubiquitous computing environments to facilitate the commission of crimes. The cyber criminals typically launch different forms of large-scale and coordinated attacks, causing huge financial loss and potential life hazard. In this talk, we report two innovative approaches to defend against large-scale and coordinated attacks in the ubiquitous environments: 1) Inferring the cyber crime's intent through network traffic classification to enable the early warning of potential attacks, and 2) Profiling the large-scale and coordinated cyber attacks through both microscopic and macroscopic modeling to provide better control of such attacks. These approaches are effective in finding weak symptoms caused by the attacks thus can successfully defend against the large-scale and coordinated attacks at their early stages.

History

Event

International Conference on Trust, Security and Privacy in Computing and Communications (10th : 2011 : Changsha, China)

Pagination

7 - 8

Publisher

IEEE

Location

Changsha, China

Place of publication

[Changsha, China]

Start date

2011-11-16

End date

2011-11-18

ISBN-13

9781457721359

ISBN-10

145772135X

Language

eng

Publication classification

E1 Full written paper - refereed

Copyright notice

2011, IEEE

Title of proceedings

TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications