1 / 0
Cyber Security Challenges a social informatics touch on old attacks
10 likes | 149 Vues
Cyber Security Challenges a social informatics touch on old attacks. S. Felix Wu University of California, Davis. FROM:MR.CHEUNG PUI Hang Seng Bank Ltd Sai Wan Ho Branch 171 Shaukiwan Road Hong Kong. Please contact me on my personal box [ puicheungcheungpui@yahoo.com ]
Télécharger la présentation
Cyber Security Challenges a social informatics touch on old attacks
An Image/Link below is provided (as is) to download presentation
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.
Content is provided to you AS IS for your information and personal use only.
Download presentation by click this link.
While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
During download, if you can't get a presentation, the file might be deleted by the publisher.
E N D
Presentation Transcript
-
Cyber Security Challengesasocial informaticstouch on old attacks
S. Felix Wu University of California, Davis IEEE Intelligence and Security Informatics - FROM:MR.CHEUNG PUI Hang Seng Bank Ltd Sai Wan Ho Branch 171 Shaukiwan Road Hong Kong. Please contact me on my personal box [puicheungcheungpui@yahoo.com] Let me start by introducing myself. I am Mr. Cheung Pui,director of operations of the Hang Seng Bank Ltd,Sai Wan Ho Branch. I have a obscured business suggestion for you. Before the U.S and Iraqi war our client Major FadiBasem who was with the Iraqi forces and also business man made a numbered fixed deposit for 18 calendar months, with a value of Twenty Four millions Five Hundred Thousand United State Dollars only in my branch. Upon maturity several notice was sent to him,… Urgent! Please contact me!
- Davis Social Links @ Hong Kong University
- To me personally, this was a typical social spam. Davis Social Links @ Hong Kong University
- Oops… Davis Social Links @ Hong Kong University
- 11/27 /2007 12/10 /2007 Spammed? “Memoryless” For Felix Wu 11/16 /2007 11/26 /2007 In my office Davis Social Links @ Hong Kong University
- Application Existing Applications Social-Enabled Applications and Games Wrapper Felix Eric Social Context tagging DSL/FAITH Name-ID resolution Community Oriented Keywords Social network transformation Policy/Reputation-based Route discovery OSN FAITH over OSN DSL FAITH Emphasizing Trustworthiness in Social Informatics IEEE Intelligence and Security Informatics
- https://dslcore.slice1054.genislices.emulab.net/soemail/src/login.php https://dslcore.slice1054.genislices.emulab.net/soemail/src/login.php geni GENI X-DSL 0x15EF2AC4 0.667 John Will Amy Eric Justin Felix Mary Nancy Sam Tim IEEE Intelligence and Security Informatics
- Social Packets for Intel, Hillsboro, OR
- Social Media Systems IEEE Intelligence and Security Informatics
- Social Media Systems Attacks leveraging Social Informatics IEEE Intelligence and Security Informatics
- Socware Attacks leveraging Social Informatics IEEE Intelligence and Security Informatics
- Social Media Systems But, they (attackers) can go much deeper! IEEE Intelligence and Security Informatics
- Relationships & Structures IEEE Intelligence and Security Informatics
- Applications FB friends: 790+ FV neighbors: 30+ Justin neighbor Eric Felix The “Add me please” push!!! friend IEEE Intelligence and Security Informatics
- Social Interactions 16
- Social Relationships and Structures Applications Social Interactions How much of you has been revealed and recorded? IEEE Intelligence and Security Informatics
- Social Relationships and Structures Applications Social Interactions (Public Forums) How much of you has been revealed and recorded? IEEE Intelligence and Security Informatics
- Public FB Discussions pages/groups: 880,664posts: 18,618,481comments: 150,430,423likedby: 1,013,593,179message_tags: 889,444places: 4,735shares: 8,924,826story_tags: 102,943fb_users: 116,388,463 19 IEEE Intelligence and Security Informatics
- IEEE Intelligence and Security Informatics
- Cognitive Elements Affective Element Linguistic Features
- Occupy LA
- Top 10%
- IEEE Intelligence and Security Informatics 24
- Opinion Classification http://www.facebook.com/occupyLA/posts/349187595101578
- Time of Participation IEEE Intelligence and Security Informatics
- The “attacker” can do a lot more now! Davis Social Links @ Hong Kong University
- Challenges Cyber Attacks deeply leveraging Social Informatics Risk Assessment on Public Social Informatics Real-Time Analysis and Monitoring of Social Interactions Binding Social Informatics with Computation, Communication, and Information Flow IEEE Intelligence and Security Informatics
- Samples of Social Sciences Bandwagon Effect, Information Cascade, Media Framing, Spiral of Silence, Goal Detection, Opinion Formation Social Structure, community development, Social Capitals Psychological Linguistics IEEE Intelligence and Security Informatics
- November 20-26 of 2011 November 6-12 of 2011 IEEE Intelligence and Security Informatics
- And, of course,… IEEE Intelligence and Security Informatics
- http://sincere.se
- IEEE Intelligence and Security Informatics
- Social Informatics 1. Social Relationship and Structures 2. Behavior 3. Influence among Content, Discussion and Community Formation Partial Projection/Reflection of Real-life Human Relationship Relationships established only via Online Interactions IEEE Intelligence and Security Informatics 34
- Social Informatics But, they (attackers) can go much deeper! “We need to promote”, e.g., some fund raising activities – On the subjects, you have deeply involved Within the community, you have actively interacted with And, your passion reveals much of yourself. IEEE Intelligence and Security Informatics
- Challenges Social Informatics, Big Data Depth and Threat of Social Informatics Plane It’s not just applications like Zynga’s Human + Cyber + Social Informatics Future play ground for cyber security IEEE Intelligence and Security Informatics
- IEEE Intelligence and Security Informatics
- Social Computing Leveraging Social Informatics within Computational Activities Computing Entity Information Entity RelationshipPath Selection Social Entity Social Entity Systematic/Digitized IEEE Intelligence and Security Informatics
- Social-Centric OS Kernel Social Informatics IEEE Intelligence and Security Informatics
- UPR. LYR. PAYLOAD TCP/UDP HDR IP NOP NOP NOP NOP Decryption Code Attack Code Exploit (ReturnAddr) Focus on “Primitives” being used in the “Epsilon” phase! Application dependent analysis System State Changes IEEE Intelligence and Security Informatics
- IEEE Intelligence and Security Informatics
- IEEE Intelligence and Security Informatics
More Related