1 / 0

Cyber Security Challenges a social informatics touch on old attacks

Cyber Security Challenges a social informatics touch on old attacks. S. Felix Wu University of California, Davis. FROM:MR.CHEUNG PUI Hang Seng Bank Ltd Sai Wan Ho Branch 171 Shaukiwan Road Hong Kong. Please contact me on my personal box [ puicheungcheungpui@yahoo.com ]

nhung
Download Presentation

Cyber Security Challenges a social informatics touch on old attacks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Security Challengesasocial informaticstouch on old attacks

    S. Felix Wu University of California, Davis IEEE Intelligence and Security Informatics
  2. FROM:MR.CHEUNG PUI Hang Seng Bank Ltd Sai Wan Ho Branch 171 Shaukiwan Road Hong Kong. Please contact me on my personal box [puicheungcheungpui@yahoo.com] Let me start by introducing myself. I am Mr. Cheung Pui,director of operations of the Hang Seng Bank Ltd,Sai Wan Ho Branch. I have a obscured business suggestion for you. Before the U.S and Iraqi war our client Major FadiBasem who was with the Iraqi forces and also business man made a numbered fixed deposit for 18 calendar months, with a value of Twenty Four millions Five Hundred Thousand United State Dollars only in my branch. Upon maturity several notice was sent to him,… Urgent! Please contact me!
  3. Davis Social Links @ Hong Kong University
  4. To me personally, this was a typical social spam. Davis Social Links @ Hong Kong University
  5. Oops… Davis Social Links @ Hong Kong University
  6. 11/27 /2007 12/10 /2007 Spammed? “Memoryless” For Felix Wu 11/16 /2007 11/26 /2007 In my office Davis Social Links @ Hong Kong University
  7. Application Existing Applications Social-Enabled Applications and Games Wrapper Felix Eric Social Context tagging DSL/FAITH Name-ID resolution Community Oriented Keywords Social network transformation Policy/Reputation-based Route discovery OSN FAITH over OSN DSL  FAITH Emphasizing Trustworthiness in Social Informatics IEEE Intelligence and Security Informatics
  8. https://dslcore.slice1054.genislices.emulab.net/soemail/src/login.php https://dslcore.slice1054.genislices.emulab.net/soemail/src/login.php geni GENI X-DSL 0x15EF2AC4 0.667 John Will Amy Eric Justin Felix Mary Nancy Sam Tim IEEE Intelligence and Security Informatics
  9. Social Packets for Intel, Hillsboro, OR
  10. Social Media Systems IEEE Intelligence and Security Informatics
  11. Social Media Systems Attacks leveraging Social Informatics IEEE Intelligence and Security Informatics
  12. Socware Attacks leveraging Social Informatics IEEE Intelligence and Security Informatics
  13. Social Media Systems But, they (attackers) can go much deeper! IEEE Intelligence and Security Informatics
  14. Relationships & Structures IEEE Intelligence and Security Informatics
  15. Applications FB friends: 790+ FV neighbors: 30+ Justin neighbor Eric Felix The “Add me please” push!!! friend IEEE Intelligence and Security Informatics
  16. Social Interactions 16
  17. Social Relationships and Structures Applications Social Interactions How much of you has been revealed and recorded? IEEE Intelligence and Security Informatics
  18. Social Relationships and Structures Applications Social Interactions (Public Forums) How much of you has been revealed and recorded? IEEE Intelligence and Security Informatics
  19. Public FB Discussions pages/groups: 880,664posts: 18,618,481comments: 150,430,423likedby: 1,013,593,179message_tags: 889,444places: 4,735shares: 8,924,826story_tags: 102,943fb_users: 116,388,463 19 IEEE Intelligence and Security Informatics
  20. IEEE Intelligence and Security Informatics
  21. Cognitive Elements Affective Element Linguistic Features
  22. Occupy LA
  23. Top 10%
  24. IEEE Intelligence and Security Informatics 24
  25. Opinion Classification http://www.facebook.com/occupyLA/posts/349187595101578
  26. Time of Participation IEEE Intelligence and Security Informatics
  27. The “attacker” can do a lot more now! Davis Social Links @ Hong Kong University
  28. Challenges Cyber Attacks deeply leveraging Social Informatics Risk Assessment on Public Social Informatics Real-Time Analysis and Monitoring of Social Interactions Binding Social Informatics with Computation, Communication, and Information Flow IEEE Intelligence and Security Informatics
  29. Samples of Social Sciences Bandwagon Effect, Information Cascade, Media Framing, Spiral of Silence, Goal Detection, Opinion Formation Social Structure, community development, Social Capitals Psychological Linguistics IEEE Intelligence and Security Informatics
  30. November 20-26 of 2011 November 6-12 of 2011 IEEE Intelligence and Security Informatics
  31. And, of course,… IEEE Intelligence and Security Informatics
  32. http://sincere.se
  33. IEEE Intelligence and Security Informatics
  34. Social Informatics 1. Social Relationship and Structures 2. Behavior 3. Influence among Content, Discussion and Community Formation Partial Projection/Reflection of Real-life Human Relationship Relationships established only via Online Interactions IEEE Intelligence and Security Informatics 34
  35. Social Informatics But, they (attackers) can go much deeper! “We need to promote”, e.g., some fund raising activities – On the subjects, you have deeply involved Within the community, you have actively interacted with And, your passion reveals much of yourself. IEEE Intelligence and Security Informatics
  36. Challenges Social Informatics, Big Data Depth and Threat of Social Informatics Plane It’s not just applications like Zynga’s Human + Cyber + Social Informatics Future play ground for cyber security IEEE Intelligence and Security Informatics
  37. IEEE Intelligence and Security Informatics
  38. Social Computing Leveraging Social Informatics within Computational Activities Computing Entity Information Entity RelationshipPath Selection Social Entity Social Entity Systematic/Digitized IEEE Intelligence and Security Informatics
  39. Social-Centric OS Kernel Social Informatics IEEE Intelligence and Security Informatics
  40. UPR. LYR. PAYLOAD TCP/UDP HDR IP NOP NOP NOP NOP Decryption Code Attack Code Exploit (ReturnAddr) Focus on “Primitives” being used in the “Epsilon” phase!  Application dependent analysis System State Changes IEEE Intelligence and Security Informatics
  41. IEEE Intelligence and Security Informatics
  42. IEEE Intelligence and Security Informatics
More Related