1 / 19

Do you know someone may be watching you?

Do you know someone may be watching you?. Wilber R. Rivas Del Rio High School San Felipe Del Rio CISD Dr. Guofei Gu Director of SUCCESS laboratory S ec u re C ommunication and C omput e r S y s tems Computer Science & Engineering. Research question?.

Download Presentation

Do you know someone may be watching you?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Do you know someone may be watching you? Wilber R. Rivas Del Rio High School San Felipe Del Rio CISD Dr. Guofei Gu Director of SUCCESS laboratory Secure Communication and Computer Systems Computer Science & Engineering

  2. Research question? • Identifying sources that are hacking into your system by using various techniques in computer science and mathematics.

  3. Research • To solve practical security problems • networking and system techniques • applied cryptography • machine learning • probability/statistics • information theory • graph theory

  4. GuofeiGu • Assistant professor in the Department of Computer Science & Engineering • PhD Georgia Tech, 2008

  5. Dr. Gu’s Interests and Research • Automated collection and analysis of web-based bot malware infections • Interests include all aspects of network and system security. • Internet malware detection, defense, and analysis • Intrusion detection and anomaly detections • Network security • Web and social networking security

  6. Malware • Short for malicious software, consists of programming (code, scripts, active content, and other software) • Loss of privacy

  7. Bot In malware, a botnet is a collection of infected computers or bots

  8. Cryptography • Secret writing • Ciphertext • The conversion of information from a readable state to apparent nonsense • ATM cards • Computer passwords

  9. Machine learning • Technique • A branch of artificial intelligence • Design and development of algorithms • Recognize complex patterns

  10. SUCCESS Lab Students

  11. Jialong Zhang • Bachelors degree in Computer Science • PhD student • Intrusion detection systems for enterprises • Design graph related algorithms to detect abnormal traffic

  12. Chao Yang • PhD student • Wireless Network Security • Detect Rogue Access Point • Online Social Networking Website Security • Detect malicious/spam accounts • Analyze cyber criminal ecosystem

  13. Published paper accepted to RAID'11 • Chao Yang, Robert Harkreader, GuofeiGu. "Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers." To appear in Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection (RAID 2011),

  14. Zhaoyan Xu • Malware Analysis • How to categorize malware and what they do • Static analysis and dynamic analysis of malware • Malware encryption and decryption • Malware detection

  15. Cryptography Applications • Communicating securely over an insecure channel

  16. Ideas for classroom • Computer Network Security • Cryptography • Mathematics • Encryption and Decryption of data

  17. Mathematical Functions • Encryption function • E(P)=C • Decryption Function • D(C)=P • Inverse functions • D(E(P)) = P and E(D(C)) = C

  18. Matrices

  19. Acknowledgements

More Related