Big Data Analysis in Cyber Security. K P Chow Law and Technology Center Center for Information Security and Cryptography

Size: px
Start display at page:

Download "Big Data Analysis in Cyber Security. K P Chow Law and Technology Center Center for Information Security and Cryptography"

Transcription

1 Big Data Analysis in Cyber Security K P Chow Law and Technology Center Center for Information Security and Cryptography University of Hong Kong Nov

2 Size of Attack Data Growing DDoS size now mostly ranges from 1Gbps to over 100Gbps, thus creating huge data logs for analysis 2

3 Log Review vs Big Data Analytics Extensive Sources of Data to be analyzed => Big Data Analytics Source: 3

4 BIG DATA IN MASSIVE CYBER ATTACKS CASE STUDY: CYBER ATTACKS BEFORE & AFTER OCM 4

5 The Beginning From June 2014 (after the d-day 3), Hong Kong citizens were invited to vote on a referendum on constitutional reforms that would guarantee all citizens the right to vote in elections that determine who will be the city's Chief Executive. To build a public consensus around a recent civil proposal on universal suffrage, the civic group Occupy Central with Love and Peace (OCLP) appointed the Public Opinion Programme (HKUPOP) at the University of Hong Kong to host the civil referendum on their servers. 5

6 The First Attack The voting system was hosted by Amazon Web Services (AWS), Cloudflare and UDomain. All three web hosting services suffered from large scale DDoS attacks on June 14 and 15: AWS recorded 10 billion system requests with 20 hours CloudFare recorded a 75Gb DDoS per second UDomain recorded 10Gb per second The Feb 2000 Attack Yahoo! received in excess of 1GB per second during the peak of the attack Buy.Com received traffic quantities approximately to 8 times of their total capacity 6

7 As the scale of attack is tremendous, all three service providers were forced to temporarily suspend their services. An expert estimated that there could be at least 5,000 but possibly more than 10,000 computers involved in the attack. CISC 7

8 Oct 2: Operation Hong Kong 'Anonymous' hacker group declares cyber war on Hong Kong government, police Greetings, world. We are Anonymous. Operation Hong Kong engaged. We are Anonymous. We are legion. We do not forgive. We do not forget. Government of Hong Kong, expect 8 us.

9 Oct 2: Anonymous declares war against HK Police Hactivist collective Anonymous, Antisec division, declared a cyber-war against Hong Kong for the treatment of protestors there. The group has already defaced several Hong Kongbased websites, and that dozens more would be affected over the next few days.

10 Cyber Attack during OCM

11 Cyber Attack after OCM

12 Total Number of Attacks Targeting Hong Kong (September and October, 2014) CISC 12

13 Peak Attack Sizes per Day (Gbps) in the first week of November It is apparent that DDoS attacks have become the new normal during periods of political unrest worldwide CISC 13

14 How to defense massive cyber attacks? Content Distribution Network CDN 14

15 Problems in Investigation Usually required to analyze large amount of attack data: do we have the data? Network forensics challenges Possibility of collecting all attack data Prerequisite settings for incident response and cyber attack analysis Cross jurisdiction issues - traceback

16 From Online to Offline CISC 16

17 CYBER CRIMINAL PROFILING USING BIG DATA CASE STUDY: PROFILING ONLINE FLASH MOB ORGANIZER AFTER OCM 17

18 After Occupy Central More conflicts between Hong Kong locals and mainland China visitors 18

19 From online to offline Flash-mob-like activity callings posted on the forum : Asking people to go shopping at a specified location and disperse afterwards 19

20 Questions of Interests Identification of Flash Mob Organizers online What are the key online behavioral attributes these flash-mob-like organizer(s) might have? Is it possible to identify these individuals at an early stage based on these attributes? Social Influence Index Is it possible to measure the social influence of these flash-mob-like organizer(s)? 20

21 Methodology STEP 1 STEP 2 STEP 3 Collection of data Extraction of key online behavioral attributes Classification of Topic Authors Identification of most influential flash mob organizer Discussion Forum is selected instead of Facebook because the privacy setting of Facebook might limit the data to be collected for research The key online behavioural attributes will be explained in the following slides Clustering will be used for the classification process A Social Influence Index will be introduced to measure the most influential flash mob organizer 21

22 STEP 1 STEP 2 STEP 3 Collection of data Extraction of key online behavioral attributes Classification of Topic Authors Identification of most influential flash mob organizer METHODOLOGY 22

23 Online Forum Variable name Description Value Forum_ID Identifier of a forum Nominal Forum_subcat Identifier of a forum subcategory Nominal (i) Topic variables Topic_ID Identifier of a topic ID Topic_author Author a new topic ID Topic_date Creation date of a new topic Date Topic_time Creation time of a new topic Time Topic_title Title of a new topic Text (i) Post variables Post_ID Identifier of a post under the topic ID Post_author Author a post under the topic ID Post _date Creation date of a post under the topic Date Post _time Creation time of a post under the topic Time Post _content Contents of a post under the topic Text 23

24 Big Data??? 200, , ,000 50,000 0 Total number of posts (Jan-Apr, 2015) 199, , ,400135,806 Jan Feb Mar Apr 6,000 5,000 4,000 3,000 2,000 1,000 0 Total number of topics (Jan-Apr, 2015) 3,273 3,896 5,912 4,174 Jan Feb Mar Apr These are just data from ONE subcategory. On average, there are: 4,314 topics per month, i.e. 51,765 topics per year 157,414 posts per month, i.e. 1,888,971 posts per year There are 33 subcategories under just ONE forum! 24

25 2 types of online users 16,000 14,000 12,000 10,000 8,000 6,000 4,000 2, ,484 13,221 1,026 1,154 1,506 1,161 Jan Feb Mar Apr Total number topic authors 14,694 14,343 Total number post authors These are just data from ONE subcategory. On average, there are: 1,212 topic-authors per month, i.e. 14,541 topic-authors per year 13,936 post-authors per month, i.e. 167,226 post-authors per year There are 33 subcategories under just ONE forum! 25

26 STEP 1 STEP 2 STEP 3 Collection of data Extraction of key online behavioral attributes Classification of Topic Authors Identification of most influential flash mob organizer METHODOLOGY 26

27 Type of Posts Empty & Spam Typical front page extracted from a subcategory of the forum: In order to keep a topic on the front page, topic-authors or post-authors might create some empty/spam posts to a topic. A typical empty/spam posts Spam post with the word push but no other contents Empty post with emoticons only, no contents 27

28 Key Online Attributes of Topic-Author Motivation#1 a Motivation#2 a Ability#1 b Ability#2 b Attributes total number of topics created by the Topic Author total number of empty/spam posts created by the Topic Author total number of posts responded by other Post Authors (including both empty posts and nonempty posts) Descriptions this shows the Topic Author is frequently engaging the community this shows the Topic Author is very eager to keep the topic at a higher rank a Motivation: In order to influence others, a Topic Author total number might of have non-empty/spam higher motivation in posts created by Topic trying to engage others in discussing the topics Author created by him/her. this shows the Topic Author is good at engaging conversation with other Post Authors this is an indication of the ability of Topic Author to attract others to discuss the topic b Ability: In order to influence other people, a Topic Author might have higher abilities than others to engage people in discussions of the topics created. 28

29 Results: Classification#1 Moderate-Inactive n=876, 28.8% of the sample s population No significant difference in motivation score with Inactive- Silent-Majority group Showed slightly better ability in engaging in topic discussion Inactive-Silent-Majority n=1552, 51.1% of the sample s population least motivated with the lowest ability creating an average of 1 to 2 topics during this 4- month period 29

30 Results: Classification#2 Active-Vocal-Minority n=155, 5.1% of the sample s population received an average of 1,853 posts/topic replied an average of 162 non-empty posts/topic posted an average of 71 new topics continuously during the 4-month period on average they are creating one new topic every 2.5 days Moderate-active n=457, 15.0% of the sample s population ranked second best in terms of motivation and ability as topic authors n=278, 61% of this group has been active as topic authors 30 for 2 to 3 months duration

31 STEP 1 STEP 2 STEP 3 Collection of data Extraction of key online behavioral attributes Classification of Topic Authors Identification of most influential flash mob organizer METHODOLOGY 31

32 We define as follows: Social Influence Index Social Influence Index = Log(z-score) Receives n (=r+e) posts to the topic Topic-author X creates a topic on the discussion forum By definition, z-score = Non-empty post #1 Non-empty post #r Empty/spam post #1 Empty/spam post #e x μ σ n 2 where μ = n p = σ = n p 1 p = n/2 Assume a random Post Author who responses with non-empty posts of probability p=0.5 and with empty posts of probability 1 - p =0.5 Thus, z score = r n/2 n/2 = r e r + e 32

33 Results Inactive- Silent- Majority (n=1552) Moderate -Inactive (n=876) Moderate -Active (n=457) Active- Vocal- Minority (n=155) Social Influence Index Total number of flash-mob-like topics Total number of posts replied to flash-mob-like topics ,076 29, , , ,279 The highest Social Influence Index score The most number (1,076) of flash-mob-like-demonstrationtopics, which accounted for 57% of the total. The most number (334,279) of responses, which accounted for 53% of the total. 33

34 Sample Topic-Author from Active- Vocal-Minority group Created 183 topics in just one month (March 2015)! Responded 552 times in just one month (March 2015)! 34

35 Challenges of Social Media Mining 1. Data collection issue 2. Empirical evaluation issue 3. Noise issue 35

36 Conclusion Cyber attacks investigation Do we have the data? Do we know how to analyze the data? From online to offline We have lots of data! Big data!!! Do we know how to analyze them? 36

37 谢 谢 Thank You

Analysis One Code Desc. Transaction Amount. Fiscal Period

Analysis One Code Desc. Transaction Amount. Fiscal Period Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00

More information

Protect Yourself in the Cloud Age

Protect Yourself in the Cloud Age Protect Yourself in the Cloud Age Matthew Wu Consultant Hong Kong Computer Emergency Response Team Coordination Centre About HKCERT HKCERT ( 香 港 電 腦 保 安 事 故 協 調 中 心 ) Established in 2001 Funding & Operation

More information

TLP WHITE. Denial of service attacks: what you need to know

TLP WHITE. Denial of service attacks: what you need to know Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...

More information

Legal Issues / Estonia Cyber Incident

Legal Issues / Estonia Cyber Incident Control System Cyber Security Conference 22 October 2009 Legal Issues / Estonia Cyber Incident Maeve Dion Center for Infrastructure Protection George Mason University School of Law Legal Issues / Estonia

More information

Government Projects (as Prime Contractor)

Government Projects (as Prime Contractor) The Judiciary Security Risk Assessment & Audit Services for the Judiciary Mar 2014 HK$680,000 The Treasury Security Risk Assessment and Audit Services for the Treasury Oct 2013 HK$480,000 Lands Security

More information

SEO REPORT. Prepared for searchoptions.com.au

SEO REPORT. Prepared for searchoptions.com.au REPORT Prepared for searchoptions.com.au March 24, 2016 searchoptions.com.au ISSUES FOUND ON YOUR SITE (MARCH 24, 2016) This report shows the issues that, when solved, will improve your site rankings and

More information

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley Firstly, an apology + + = What shall we discuss What is Cyber Crime? What are the current threats? What is the capability of local and

More information

Information Security Summit 2005

Information Security Summit 2005 Information Security Summit 2005 Forensically Sound Information Security Management in a Risk Compliance Era Keynote Opening Address by Mr. Howard C Dickson Government Chief Information Officer Government

More information

Using big data analytics to identify malicious content: a case study on spam emails

Using big data analytics to identify malicious content: a case study on spam emails Using big data analytics to identify malicious content: a case study on spam emails Mamoun Alazab & Roderic Broadhurst Mamoun.alazab@anu.edu.au http://cybercrime.anu.edu.au 2 Outline Background Cybercrime

More information

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network

More information

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece Network security policy issues Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece 1 Sample Agenda Slide 1 The current threat landscape 2 IT security and policy leadership 3 The EU

More information

New challenges in Data privacy.

New challenges in Data privacy. New challenges in Data privacy. Zdravko Stoychev, CISM CRISC Information Security Officer Alpha Bank Bulgaria branch South East European Regional Forum on Cybersecurity and Cybercrime, 2013 11-13 Nov 2013

More information

Leveraging Email, Social & Web. Budget Friendly & Effective Marketing

Leveraging Email, Social & Web. Budget Friendly & Effective Marketing Leveraging Email, Social & Web Budget Friendly & Effective Marketing Agenda Why Leverage the Web? Web Metrics & Results Web Tactics Social & Email Marketing How to Get Started Today Feel free to ask questions

More information

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of

More information

What legal aspects are needed to address specific ICT related issues?

What legal aspects are needed to address specific ICT related issues? What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : b.zouari@ansi.tn

More information

ITRC announces latest updates of its Visitor Profile Study (VPS)

ITRC announces latest updates of its Visitor Profile Study (VPS) Thursday, 3 April 2014 ITRC announces latest updates of its Visitor Profile Study (VPS) IFT Tourism Research Centre (ITRC) is releasing today the most updated results of its Macao Visitor Profile Survey

More information

ITRC Forum 2014 萬 雲 皆 有 險 : 雲 計 算 的 安 全 怎 影 響 你 的 管 理 概 念

ITRC Forum 2014 萬 雲 皆 有 險 : 雲 計 算 的 安 全 怎 影 響 你 的 管 理 概 念 ITRC Forum 2014 萬 雲 皆 有 險 : 雲 計 算 的 安 全 怎 影 響 你 的 管 理 概 念 How Cloud Computing Can Rain on Your IT Management Strategy By Roger Lee Presentation for ITRC Forum 2014 11 Dec 2014 (Thu) Agenda Response to

More information

White Paper. Intelligence Driven. Security Monitoring. v.2.1.1. nexusguard.com

White Paper. Intelligence Driven. Security Monitoring. v.2.1.1. nexusguard.com White Paper 1 Intelligence Driven Security Monitoring v.2.1.1 Overview In today s hypercompetitive business environment, companies have to make swift and decisive decisions. Making the right judgment call

More information

CONTENT DELIVERY NETWORKS

CONTENT DELIVERY NETWORKS T H E NEXT G E N E R A T I O N O F CONTENT DELIVERY NETWORKS For The Next Generation of Business to Go Forward, The Next Generation of CDN Must Go Faster THE FUTURE OF CDN 55% of global Internet traffic

More information

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH by Veronika Macková and Viktória Sučáková As we kick of spring of 2014, GNC Team is starting quarterly insight to cyber world from the point of view

More information

Corero Network Security plc

Corero Network Security plc Corero Network Security plc The Stock Market Show 13 September 2014 Ashley Stephenson, CEO Overview Corero goes to market as a First Line of Defense that stops DDoS Attacks and Cyber Threats AIM listed

More information

How To Understand The City Of Hong Kong

How To Understand The City Of Hong Kong OGCIO Seminar on PSI/Data.One PSI and Big Data Jiannong Cao Department of Computing Hong Kong Polytechnic University Big Data TB (10 12 bytes) PB (10 15 bytes) EB (10 18 bytes) ZB (10 21 bytes)... The

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

Table of Contents. Overview... 1 Introduction... 2 Common Architectures... 3. Technical Challenges with Magento... 6. ChinaNetCloud's Experience...

Table of Contents. Overview... 1 Introduction... 2 Common Architectures... 3. Technical Challenges with Magento... 6. ChinaNetCloud's Experience... Table of Contents Overview... 1 Introduction... 2 Common Architectures... 3 Simple System... 3 Highly Available System... 4 Large Scale High-Performance System... 5 Technical Challenges with Magento...

More information

Computer Forensics and Incident Response in the Cloud. Stephen Coty AlertLogic, Inc. @Twitter AlertLogic_ACID

Computer Forensics and Incident Response in the Cloud. Stephen Coty AlertLogic, Inc. @Twitter AlertLogic_ACID Computer Forensics and Incident Response in the Cloud SESSION ID: ANF-T07A Stephen Coty AlertLogic, Inc. @Twitter AlertLogic_ACID Why forensics in the cloud? Cloud market revenue will increase at a 36%

More information

DDoS DETECTING. DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. [ Executive Brief ] Your data isn t safe. And neither is your website or your business.

DDoS DETECTING. DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. [ Executive Brief ] Your data isn t safe. And neither is your website or your business. [ Executive Brief ] DDoS DETECTING DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. Your data isn t safe. And neither is your website or your business. Hacking has become more prevalent and more sophisticated

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information

Domain Name Abuse Detection. Liming Wang

Domain Name Abuse Detection. Liming Wang Domain Name Abuse Detection Liming Wang Outline 1 Domain Name Abuse Work Overview 2 Anti-phishing Research Work 3 Chinese Domain Similarity Detection 4 Other Abuse detection ti 5 System Information 2 Why?

More information

SEO-ANALYSE RAPPORT. Forberedt for tv2.dk

SEO-ANALYSE RAPPORT. Forberedt for tv2.dk SEO-ANALYSE RAPPORT Forberedt for tv2.dk 25. marts 2016 tv2.dk SEO ISSUES FOUND ON YOUR SITE (25. MARTS 2016) This report shows the SEO issues that, when solved, will improve your site rankings and increase

More information

Data Breaches, Identity Theft, and Employees

Data Breaches, Identity Theft, and Employees Data Breaches, Identity Theft, and Employees Joining the Dots and Dispelling the Myths What you ll learn Data Breaches + identity theft + employees Data Breaches or Data Donations? Data Breaches + Identity

More information

Basheer Al-Duwairi Jordan University of Science & Technology

Basheer Al-Duwairi Jordan University of Science & Technology Basheer Al-Duwairi Jordan University of Science & Technology Outline Examples of using network measurements /monitoring Example 1: fast flux detection Example 2: DDoS mitigation as a service Future trends

More information

BT Retail Social Media making it easy for our customers

BT Retail Social Media making it easy for our customers BT Retail Social Media making it easy for our customers Dawn Walton, GM Central Planning Nigel Elliott, Social Media Channel Manager Kerry Gulloch, Social Media Communities Manager Agenda o How we ended

More information

SEO Presentation. Asenyo Inc.

SEO Presentation. Asenyo Inc. SEO Presentation What is Search Engine Optimization? Search Engine Optimization (SEO) : PPC and Organic Results Pay Per Click Ads The means of achieving top search engine results without having to incur

More information

Freedom of Information Request Reference No: I note you seek access to the following information:

Freedom of Information Request Reference No: I note you seek access to the following information: Freedom of Information Request Reference No: I note you seek access to the following information: 1. How many incidents in the UK have the police been called to because of people being drug and disorderly

More information

Architectural Services Data Summary March 2011

Architectural Services Data Summary March 2011 Firms Typically Small in Size According to the latest U.S. Census Survey of Business Owners, majority of the firms under the description Architectural Services are less than 500 in staff size (99.78%).

More information

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination

More information

Denial of Service. Tom Chen SMU tchen@engr.smu.edu

Denial of Service. Tom Chen SMU tchen@engr.smu.edu Denial of Service Tom Chen SMU tchen@engr.smu.edu Outline Introduction Basics of DoS Distributed DoS (DDoS) Defenses Tracing Attacks TC/BUPT/8704 SMU Engineering p. 2 Introduction What is DoS? 4 types

More information

2/24/2011. What is Cyber Security? Law Enforcement Perspective. IT professional s Perspective. Managerial Perspective. Netizen s Perspective

2/24/2011. What is Cyber Security? Law Enforcement Perspective. IT professional s Perspective. Managerial Perspective. Netizen s Perspective Cyber Security & Internet Technology Laws in India What is Cyber Security? By (LBSIT on 24 th Feb 2011) There could be different Perspectives IT professional s Perspective Law Enforcement Perspective Netizen

More information

Taking stock of China s external debt: low indebtedness, but rapid growth is a concern

Taking stock of China s external debt: low indebtedness, but rapid growth is a concern 1991 1993 1995 1997 1999 21 23 25 27 29 211 213 1991 1992 1993 1994 1995 1996 1997 1998 1999 2 21 22 23 24 25 26 27 28 29 21 211 212 213 ECONOMIC ANALYSIS Taking stock of China s external debt: low indebtedness,

More information

Using Data Mining for Mobile Communication Clustering and Characterization

Using Data Mining for Mobile Communication Clustering and Characterization Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer

More information

Large-Scale IP Traceback in High-Speed Internet

Large-Scale IP Traceback in High-Speed Internet 2004 IEEE Symposium on Security and Privacy Large-Scale IP Traceback in High-Speed Internet Jun (Jim) Xu Networking & Telecommunications Group College of Computing Georgia Institute of Technology (Joint

More information

Computer Software Bugs and Other IT Threats to Critical Infrastructure: A Preliminary Set of Considerations for IT Governance

Computer Software Bugs and Other IT Threats to Critical Infrastructure: A Preliminary Set of Considerations for IT Governance Computer Software Bugs and Other IT Threats to Critical Infrastructure: A Preliminary Set of Considerations for IT Governance Presentation for the Seventh European Academic Conference on Internal Audit

More information

Embracing Open Source: Practice and Experience from Alibaba. Wensong Zhang The 11 th Northeast Asia OSS Promotion Forum 2012.11.13

Embracing Open Source: Practice and Experience from Alibaba. Wensong Zhang The 11 th Northeast Asia OSS Promotion Forum 2012.11.13 Embracing Open Source: Practice and Experience from Alibaba Wensong Zhang The 11 th Northeast Asia OSS Promotion Forum 2012.11.13 1 Agenda 1. Overview of Alibaba 2. Taobao Software Infrastructure 3. Cases:

More information

Surviving a DDoS Attack

Surviving a DDoS Attack Surviving a DDoS Attack Matt Johnson, Technical Director, Eduserv Networkshop14, April 2014 www.eduserv.org.uk Agenda Background Diary of the DDoS Attack profiles & social media Analysis and solution overview

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer

More information

Market Assessment & Campaign SLA Calculator LOGO WE OPEN THE DOOR, SO YOU CAN CLOSE IT.

Market Assessment & Campaign SLA Calculator LOGO WE OPEN THE DOOR, SO YOU CAN CLOSE IT. Market Assessment & Campaign SLA Calculator LOGO WE OPEN THE DOOR, SO YOU CAN CLOSE IT. Your Market Assessment Overview Your Inbound Market Assessment and Campaign SLA Calculator is broken down into several

More information

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge

More information

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security

More information

Fostering Incident Response and Digital Forensics Research

Fostering Incident Response and Digital Forensics Research Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel bruce.nikkel@ubs.com September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital

More information

Online Auto Insurance

Online Auto Insurance Online Auto Insurance Presented to IIABA ACT Susan Engleson, Senior Director September 27, 2013 comscore is a leading internet technology company that provides Analytics for a Digital World NASDAQ SCOR

More information

Glasnost or Tyranny? You Can Have Secure and Open Networks!

Glasnost or Tyranny? You Can Have Secure and Open Networks! AT&T is a proud sponsor of StaySafe Online Glasnost or Tyranny? You Can Have Secure and Open Networks! Steven Hurst CISSP Director - AT&T Security Services and Technology AT&T Chief Security Office 2009

More information

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat www.etda.or.th

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat www.etda.or.th Cybersecurity: Thailand s and ASEAN s priorities Soranun Jiwasurat www.etda.or.th Cyber Threat Landscape Overview 2 Cyber threat a hostile act using computers, electronic information and/or digital networks

More information

U. S. Attorney Office Northern District of Texas March 2013

U. S. Attorney Office Northern District of Texas March 2013 U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate

More information

立 法 會 Legislative Council

立 法 會 Legislative Council 立 法 會 Legislative Council LC Paper No. CB(4)1212/14-15(04) Ref. : CB4/PL/ITB Panel on Information Technology and Broadcasting Meeting on 17 July 2015 Updated background brief on information security Purpose

More information

Engineering Doctorate (Engineering Management) 工 程 學 博 士 ( 工 程 管 理 )

Engineering Doctorate (Engineering Management) 工 程 學 博 士 ( 工 程 管 理 ) College of Science and Engineering 科 學 及 工 程 學 院 Department of Systems Engineering and Engineering Management 系 統 工 程 及 工 程 管 理 學 系 Engineering Doctorate (Engineering Management) 工 程 學 博 士 ( 工 程 管 理 )

More information

End of Life Content Report November 2014. Produced By The NHS Choices Reporting Team CH.NHSChoices-Reporting@nhs.net

End of Life Content Report November 2014. Produced By The NHS Choices Reporting Team CH.NHSChoices-Reporting@nhs.net End of Life Content Report November 2014 Produced By The NHS Choices Reporting Team CH.NHSChoices-Reporting@nhs.net End of Life Dashboard Page 1 Overall Choices Site Visits Tag cloud showing end of life

More information

Qi Liu Rutgers Business School ISACA New York 2013

Qi Liu Rutgers Business School ISACA New York 2013 Qi Liu Rutgers Business School ISACA New York 2013 1 What is Audit Analytics The use of data analysis technology in Auditing. Audit analytics is the process of identifying, gathering, validating, analyzing,

More information

Hope for the best, prepare for the worst:

Hope for the best, prepare for the worst: Hope for the best, prepare for the worst: Why your customers will demand self-service back-up Presented by Ridley Ruth, COO Breaking News Yahoo email Accounts were hacked in Jan 2014 (Washington Post)

More information

jobsdb Compensation and Benefits Survey Report 2015

jobsdb Compensation and Benefits Survey Report 2015 jobsdb Compensation and Benefits Survey Report 2015 Content Introduction. 7 Scope and methodology. 8-9 Chart Size of participating companies Definition...10-11 1. Hiring plan and market expectation 1.1

More information

2014 Foley & Lardner LLP Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative

2014 Foley & Lardner LLP Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative 2014 Foley & Lardner LLP Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative of clients 321 N. Clark Street, Suite 2800, Chicago,

More information

Executive Summary. McAfee Labs Threats Report: Third Quarter 2013

Executive Summary. McAfee Labs Threats Report: Third Quarter 2013 Executive Summary McAfee Labs Threats Report: Third Quarter Although summer can be a relatively slow season for cybercriminal activity (even the bad guys need a break occasionally), the third quarter of

More information

Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8

Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007

More information

EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER

EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER March 2013 Phishing attacks are notorious for their potential harm to online banking and credit card users who may fall prey to phishers looking to steal information

More information

Activity Report for FY 2010 Real-time Traffic Signal Adjustments

Activity Report for FY 2010 Real-time Traffic Signal Adjustments Boston Transportation Management Center Activity Report for FY 2010 Real-time Traffic Signal Adjustments The Boston Transportation Department s Transportation Management Center (TMC) holds the mission

More information

Protecting critical infrastructure from Cyber-attack

Protecting critical infrastructure from Cyber-attack Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale

More information

How to Develop a Mobile Strategy

How to Develop a Mobile Strategy How to Develop a Mobile Strategy 1 Presenter Andy Etemadi EYEMAGINE President & Chief Technology Officer 2 Presenter Greg Lett Lett Direct Vice President Web Marketing 3 Agenda Mobile Trends in ecommerce

More information

CENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY 2015. Small Commercial Service (SCS-1) GSR

CENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY 2015. Small Commercial Service (SCS-1) GSR JULY 2015 Area (RS-1) GSR GSR (LCS-1) Texarkana Incorporated July-15 $0.50690/Ccf $0.45450/Ccf $0.00000/Ccf $2.85090/MMBtu $17.52070/MMBtu Texarkana Unincorporated July-15 $0.56370/Ccf $0.26110/Ccf $1.66900/Ccf

More information

ABC PRIVACY POLICY. The ABC is strongly committed to protecting your privacy when you interact with us, our content, products and services.

ABC PRIVACY POLICY. The ABC is strongly committed to protecting your privacy when you interact with us, our content, products and services. ABC PRIVACY POLICY The ABC is strongly committed to protecting your privacy when you interact with us, our content, products and services. Our goal is to provide you and your family with media experiences

More information

DDoS Overview and Incident Response Guide. July 2014

DDoS Overview and Incident Response Guide. July 2014 DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target

More information

AMPIFY YOUR BRAND ON SNAP MOBILE S MOBILE WEB NETWORK. May 2014

AMPIFY YOUR BRAND ON SNAP MOBILE S MOBILE WEB NETWORK. May 2014 AMPIFY YOUR BRAND ON SNAP MOBILE S MOBILE WEB NETWORK May 2014 FLYDAY Monthly Page Views: 200,000+ Monthly Unique Visitors: 130,000+ URL: Flyday,.hk Flyday.hk is a leading online travel deals distribution

More information

US Army Corps of Engineers. Vision Statement. Be the premier stewards of entrusted hydropower resources

US Army Corps of Engineers. Vision Statement. Be the premier stewards of entrusted hydropower resources Vision Statement Be the premier stewards of entrusted hydropower resources Mission Statement Provide reliable hydroelectric power services at the lowest possible cost, consistent with sound business principles,

More information

2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE 2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2015 2015 Network Security & Cyber Risk Management: The FOURTH

More information

Mata : Garuda An advanced Network Monitoring System The S.L.A.D Network Security Framework. FIRST Conference Berlin, 19 June 2015

Mata : Garuda An advanced Network Monitoring System The S.L.A.D Network Security Framework. FIRST Conference Berlin, 19 June 2015 Mata : Garuda An advanced Network Monitoring System The S.L.A.D Network Security Framework FIRST Conference Berlin, 19 June 2015 1 Security in Real Life 2 3 Car Alarms Network Security Alarms 4 Our responsibility

More information

Authenticating and policing the internet for consumer confidence and security

Authenticating and policing the internet for consumer confidence and security Authenticating and policing the internet for consumer confidence and security Secure On-Line ID Introduction Unique zero intervention at a glance solution Built on positive site validation Allows policing

More information

"BIG DATA A PROLIFIC USE OF INFORMATION"

BIG DATA A PROLIFIC USE OF INFORMATION Ojulari Moshood Cameron University - IT4444 Capstone 2013 "BIG DATA A PROLIFIC USE OF INFORMATION" Abstract: The idea of big data is to better use the information generated by individual to remake and

More information

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo 2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,

More information

Government Projects (as Prime Contractor)

Government Projects (as Prime Contractor) Civil Service Training and Development Institute, Civil Service Bureau (CSTDI, CSB) System Maintenance and Support Services of the Training Administration System (TAS) for the Civil Service Training and

More information

DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack

DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack Sugih Jamin EECS Department University of Michigan jamin@eecs.umich.edu Internet Design Goals Key design goals of Internet protocols:

More information

Resource Management Spreadsheet Capabilities. Stuart Dixon Resource Manager

Resource Management Spreadsheet Capabilities. Stuart Dixon Resource Manager Resource Management Spreadsheet Capabilities Stuart Dixon Resource Manager Purpose Single view of resource data Shows rolling demand vs supply for 14 months, 2 months back, current month, and 11 forward

More information

The following is issued on behalf of the Committee on the Promotion of Civic Education:

The following is issued on behalf of the Committee on the Promotion of Civic Education: Results of 2004 Civic Education Opinion Survey released *************************************************** The following is issued on behalf of the Committee on the Promotion of Civic Education: The Committee

More information

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY MATTHIAS YEO Chief Technology Officer - APAC CISSP, CISA, CISM, PMP 1 OVER REACTING VS UNDER REACTING Reason for the world today

More information

Boston Traffic Management Center Activity Report for FY 2013 Real-time Traffic Signal Adjustments

Boston Traffic Management Center Activity Report for FY 2013 Real-time Traffic Signal Adjustments Boston Traffic Management Center Activity Report for FY 2013 Real-time Traffic Signal Adjustments The mission of the Traffic Management Center (TMC) within the Boston Transportation Department is to monitor,

More information

1. Understanding Big Data

1. Understanding Big Data Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte

More information

ONLINE TRADING IN TAIWAN

ONLINE TRADING IN TAIWAN ONLINE TRADING IN TAIWAN Online trading is still not the mainstream. In December 2001, only 8.7% of the total market turnover value was conducted online and 16% of total investor accounts were online accounts.

More information

Mobile Marketing A New Analytics Framework What we have & what we need 2/28/12

Mobile Marketing A New Analytics Framework What we have & what we need 2/28/12 Mobile Marketing A New Analytics Framework What we have & what we need 2/28/12 1! The future is increasingly mobile Yesterday 6 billion mobile devices globally and 1.2 billion mobile web users in 2011

More information

Digital War in e-business

Digital War in e-business Digital War in e-business Ricci Ieong, Secretary of ISFS, Senior Security Consultant, PrivyLink (HK) Ltd. Trend in Internet Commerce Market More Internet Commerce Market G Increase in Business to Commerce

More information

Master Move in Mastering the Online Multi-Channel. Mark Craig Business Development Manager

Master Move in Mastering the Online Multi-Channel. Mark Craig Business Development Manager Master Move in Mastering the Online Multi-Channel Mark Craig Business Development Manager Agenda What is multichannel? Opportunities & challenges of multichannel The need to be platform agnostic One high

More information

Firewalls & Intrusion Detection

Firewalls & Intrusion Detection Firewalls & Intrusion Detection CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration 2007, 2008 Robert H. Sloan Security Intrusion

More information

Central Hosting. Case Study

Central Hosting. Case Study Central Hosting Case Study October, 2014 Central Hosting Case Study Background An Chéim was originally set up to procure, distribute and implement key MIS systems (hardware and software) for the Institutes

More information

Preventing road crash injuries involving children

Preventing road crash injuries involving children Preventing road crash injuries involving children Experience of Slovenia Robert Štaba, AMZS Road Safety Comission Secretary SOL Road Safety Conference - Budapest 2011 SLOVENIA 2 million people Capital

More information

Security Information Management (SIM)

Security Information Management (SIM) 1. A few general security slides 2. What is a SIM and why is it needed 3. What are the features and functions of a SIM 4. SIM evaluation criteria 5. First Q&A 6. SIM Case Studies 7. Final Q&A Brian T.

More information

Take My Cash, Please. aka NSF Funding Opportuni/es in Secure and Trustworthy Cyberspace (SaTC) (only be sure always to call it, please, research)

Take My Cash, Please. aka NSF Funding Opportuni/es in Secure and Trustworthy Cyberspace (SaTC) (only be sure always to call it, please, research) Take My Cash, Please (only be sure always to call it, please, research) aka NSF Funding Opportuni/es in Secure and Trustworthy Cyberspace (SaTC) The SaTC Team: Nina Amla, Chris Cli.on, Jeremy Epstein,

More information

Information Security Seminar 2013

Information Security Seminar 2013 Information Security Seminar 2013 Mr. Victor Lam, JP Deputy Government Chief Information Officer Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative

More information

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention. Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention. I m not going to get more money. I m not going to get more cops. I have

More information

Consumer ID Theft Total Costs

Consumer ID Theft Total Costs Billions Consumer and Business Identity Theft Statistics Business identity (ID) theft is a growing crime and is a growing concern for state filing offices. Similar to consumer ID theft, after initially

More information