Featured Research

from universities, journals, and other organizations

New proactive approach unveiled to detect malicious software in networked computers and data

Date:
June 4, 2014
Source:
Virginia Tech
Summary:
Cybercrime comes in all forms these days. One recent headline told of the creepware or silent computer snooping that resulted in the arrest of some 90 people in 19 countries. Miss Teen USA was among the victims. Her computer had been turned into a camera and used to spy on her in her own bedroom. Computer scientists have now developed a unique anomaly protection security approach for the detection of malicious activities on networked computers.

Cybercrime comes in all forms these days. One recent headline told of the creepware or silent computer snooping that resulted in the arrest of some 90 people in 19 countries. Miss Teen USA was among the victims. Her computer had been turned into a camera and used to spy on her in her own bedroom.

On the commercial front, Target suffered the largest retail hack in U.S. history during the Christmas shopping season of 2013, and now the Fortune 500 company's outlook is bleak with steep drops in profits.

New research to be announced at the June 2014 ACM Symposium on Information, Computer and Communications Security in Kyoto, Japan has unveiled the causal relations among computer network events.

The work effectively isolates infected computer hosts and detects in advance stealthy malware also known as malicious software.

The work was conducted under the auspices of a 2010 National Science Foundation CAREER Award grant to develop software that differentiates human-user computer interaction from malware. That $530,000 award was presented to Danfeng (Daphne) Yao, associate professor of computer science at Virginia Tech. She worked with Naren Ramakrishnan, the Thomas L. Phillips Professor of Engineering, and her graduate student Hao Zhang of Beijing, China, a doctoral candidate in computer science.

The Virginia Tech computer scientists used causal relations to determine whether or not network activities have justifiable and legitimate causes to occur.

"This type of semantic reasoning is new and very powerful," Yao said.

"The true significance of this security approach is its potential proactive defense capability. Conventional security systems scan for known attack patterns, which is reactive. Our anomaly detection based on enforcing benign properties in network traffic is a clear departure from that," Yao added.

They will present their paper "Detection of Stealthy Malware Activities with Traffic Causality and Scalable Triggering Relation Discovery" on June 4. It will be published in the symposium's proceedings.

Virginia Tech Intellectual Property has filed a patent on this technology, and it is actually a continuation-in-part patent, following one of Yao's earlier patents.

Previously, Yao garnered a 3-year, $450,000 grant from the Office of Naval Research (ONR) on cyber security to quantitatively detect anomalies in Department of Defense (DOD) computers, mobile devices, command and control servers, and embedded systems deployed on navy ships.


Story Source:

The above story is based on materials provided by Virginia Tech. Note: Materials may be edited for content and length.


Cite This Page:

Virginia Tech. "New proactive approach unveiled to detect malicious software in networked computers and data." ScienceDaily. ScienceDaily, 4 June 2014. <www.sciencedaily.com/releases/2014/06/140604092717.htm>.
Virginia Tech. (2014, June 4). New proactive approach unveiled to detect malicious software in networked computers and data. ScienceDaily. Retrieved August 27, 2014 from www.sciencedaily.com/releases/2014/06/140604092717.htm
Virginia Tech. "New proactive approach unveiled to detect malicious software in networked computers and data." ScienceDaily. www.sciencedaily.com/releases/2014/06/140604092717.htm (accessed August 27, 2014).

Share This




More Computers & Math News

Wednesday, August 27, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

ICREACH: NSA Built A Google Of Americans' Info

ICREACH: NSA Built A Google Of Americans' Info

Newsy (Aug. 26, 2014) The Intercept published an article Monday profiling what the online publication called NSA's very own Google of personal data. Video provided by Newsy
Powered by NewsLook.com
Australian Airlines Relax Phone Ban Too

Australian Airlines Relax Phone Ban Too

Reuters - Business Video Online (Aug. 26, 2014) Qantas and Virgin say passengers can use their smartphones and tablets throughout flights after a regulator relaxed a ban on electronic devices during take-off and landing. As Hayley Platt reports the move comes as the two domestic rivals are expected to post annual net losses later this week. Video provided by Reuters
Powered by NewsLook.com
Ralph Lauren Gets Into Wearables Game With 'Polo Tech'

Ralph Lauren Gets Into Wearables Game With 'Polo Tech'

Newsy (Aug. 25, 2014) Ralph Lauren, partnering with OMsignal, is testing out new biometric-reading shirts called "Polo Tech" on ball boys at the U.S. Open. Video provided by Newsy
Powered by NewsLook.com
What Makes Twitch Worth $1 Billion To Amazon?

What Makes Twitch Worth $1 Billion To Amazon?

Newsy (Aug. 25, 2014) Amazon is reportedly about to purchase Twitch, a streaming service for video game players, but why? Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

    Environment News

    Technology News



    Save/Print:
    Share:

    Free Subscriptions


    Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

    Get Social & Mobile


    Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

    Have Feedback?


    Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
    Mobile: iPhone Android Web
    Follow: Facebook Twitter Google+
    Subscribe: RSS Feeds Email Newsletters
    Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins