Effective techniques for detecting and attributing cyber criminals

dc.contributor.advisor Yong Guan
dc.contributor.author Zhang, Linfeng
dc.contributor.department Department of Electrical and Computer Engineering
dc.date 2018-08-11T10:14:16.000
dc.date.accessioned 2020-06-30T02:39:21Z
dc.date.available 2020-06-30T02:39:21Z
dc.date.copyright Tue Jan 01 00:00:00 UTC 2008
dc.date.embargo 2013-06-05
dc.date.issued 2008-01-01
dc.description.abstract <p>With the phenomenal growth of the Internet, more and more people enjoy and depend on the convenience of its provided services. Unfortunately, the number of network-based attacks is also increasing very quickly. More and more fraud activities appear in online advertising networks and online auction systems. Network attackers can easily hide their identities through IP spoofing, stepping stones, network address translators, Mobile IP or other ways, and thereby reduce the chance of being captured. The current IP network infrastructure lacks measures and cannot effectively deter and identify motivated and well-equipped attackers. Therefore, innovative traceback schemes are required to attribute the real attackers. By the way, network traffic always comes with high rate in distributed format without obvious beginning and ending. These properties make network traffic much different compared with traditional data sets, and data stream model is more feasible to analyze network traffic and detect anomaly and attacks.</p> <p>In this dissertation, we design effective techniques for detecting and attributing cyber criminals. We consider two kinds of fundamental techniques: forensics-sound attack monitoring and traceback, and forensics-sound online fraud detection. The contributions of our research are as follows: We propose several innovative algorithms which answer some open problems in fundamental statistics estimation over sliding windows. Those algorithms can be used to detect anomaly and attacks in networks. We also propose efficient and effective algorithms which can trace back stepping stone attacks and single packet attacks. Streaming algorithms are presented to detect click fraud in pay-per-click streams of online advertising networks.</p>
dc.format.mimetype application/pdf
dc.identifier archive/lib.dr.iastate.edu/etd/11953/
dc.identifier.articleid 2935
dc.identifier.contextkey 2808133
dc.identifier.doi https://doi.org/10.31274/etd-180810-1117
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath etd/11953
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/26157
dc.language.iso en
dc.source.bitstream archive/lib.dr.iastate.edu/etd/11953/Zhang_iastate_0097E_10148.pdf|||Fri Jan 14 19:02:10 UTC 2022
dc.subject.disciplines Electrical and Computer Engineering
dc.subject.keywords Attack Attribution
dc.subject.keywords Attack Detection
dc.subject.keywords Data Mining
dc.subject.keywords Data Stream
dc.subject.keywords Network Security
dc.subject.keywords Sliding Windows
dc.title Effective techniques for detecting and attributing cyber criminals
dc.type dissertation
dc.type.genre dissertation
dspace.entity.type Publication
relation.isOrgUnitOfPublication a75a044c-d11e-44cd-af4f-dab1d83339ff
thesis.degree.level dissertation
thesis.degree.name Doctor of Philosophy
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Zhang_iastate_0097E_10148.pdf
Size:
1.6 MB
Format:
Adobe Portable Document Format
Description: