Do you know someone may be watching you?

Post on 31-Dec-2015

34 views 5 download

Tags:

description

Do you know someone may be watching you?. Wilber R. Rivas Del Rio High School San Felipe Del Rio CISD Dr. Guofei Gu Director of SUCCESS laboratory S ec u re C ommunication and C omput e r S y s tems Computer Science & Engineering. Research question?. - PowerPoint PPT Presentation

Transcript of Do you know someone may be watching you?

Do you know someone may be watching you?

Wilber R. RivasDel Rio High School

San Felipe Del Rio CISDDr. Guofei Gu

Director of SUCCESS laboratorySecure Communication and Computer Systems

Computer Science & Engineering

Research question?

Identifying sources that are hacking into your system by using various techniques in computer science and mathematics.

To solve practical security problems◦networking and system techniques◦applied cryptography◦machine learning

◦probability/statistics◦information theory◦graph theory

Research

Assistant professor in the Department of Computer Science & Engineering

PhD Georgia Tech, 2008

Guofei Gu

Automated collection and analysis of web-based bot malware infections

Interests include all aspects of network and system security.

◦ Internet malware detection, defense, and analysis ◦ Intrusion detection and anomaly detections ◦ Network security ◦ Web and social networking security

Dr. Gu’s Interests and Research

Short for malicious software, consists of programming (code, scripts, active content, and other software)

Loss of privacy

Malware

In malware, a botnet is a collection of infected computers or bots

Bot

Secret writing

Ciphertext

The conversion of information from a readable state to apparent nonsense◦ ATM cards◦ Computer passwords

Cryptography

Technique

A branch of artificial intelligence

Design and development of algorithms

Recognize complex patterns

Machine learning

SUCCESS Lab Students

Bachelors degree in Computer Science

PhD student

◦ Intrusion detection systems for enterprises◦ Design graph related algorithms to detect

abnormal traffic

Jialong Zhang

PhD student

Wireless Network Security◦ Detect Rogue Access Point

Online Social Networking Website Security◦ Detect malicious/spam accounts◦ Analyze cyber criminal ecosystem

Chao Yang

Chao Yang, Robert Harkreader, Guofei Gu.

"Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers." To appear in Proceedings of the 14th International

Symposium on Recent Advances in Intrusion Detection (RAID 2011),

Published paper accepted to RAID'11

Malware Analysis

How to categorize malware and what they do

Static analysis and dynamic analysis of malware

Malware encryption and decryption

Malware detection

Zhaoyan Xu

Communicating securely over an insecure channel

Cryptography Applications

Computer Network SecurityCryptography Mathematics Encryption and Decryption of data

Ideas for classroom

Encryption function◦E(P)=C

Decryption Function◦D(C)=P

◦Inverse functions D(E(P)) = P and E(D(C)) = C

Mathematical Functions

 

Matrices

Acknowledgements