Items
Description is exactly
Wei Lu
-
Android Secure Text Encryption L. P. Young Student Center, West Dining and Flag Room
-
Analyzing the Risk Level of Keene State Network by monitoring a vulnerable network called Honeynet The recent escalation of cyber security threats has prompted business, organizations, and governments to prioritize network and information security. Everyday millions of people, including Keene State College, are at risk to these attackers, often with motives of profits, to their cyber espionage and sabotage. Consequently, developing profiles of these attackers? behavior has become crucial to the prevention and eradication of these threats. In the proposed project, we seek to analyze these attackers' behaviors through vulnerable monitored networks called a honeynet. Using advanced virtualization technologies, we will be able to collect forensic data from an attack at real-time - giving us important information such as geographic distribution and service communities - which can then be given to network administrators to prevent further attacks. Likewise, since the Honeynet will be built at Keene State College, the information collected will be transferred to a monthly report that includes the risk level of our network.
-
Investigating Criminal Intent with Mobile Botnets Over the last few years there has been a convergence of human activities using mobile computing with devices such as tablets or smartphones. This research will investigate one of the biggest criminal security threats called a mobile botnet, responsible for criminal activities known as distributed denial of service (DDoS) attacks. DDoS attacks attempt to make a machine or network resource unavailable to its intended users. A mobile botnet refers to a collection of infected mobile devices (bots) that interact to accomplish some distributed task (DDoS attack) for illegal purposes. The bots are controlled by an attacker (botmaster) through various command and control channels implemented by mobile applications. In this research, we will first simulate a mobile botnet system called mongoose running on mobile devices. Thereafter, the communications between the botmaster and bots using the mongoose application in order to understand DDoS attacks targeted towards a centralized business or academic server.
-
Where have all the Files Gone, Long-Time Passing? We as people use computers to store important information because, unlike keeping knowledge in analog(ue) machines, digital computers make exact copies of our files when told to do so.But do they really? How do we even know if they do?In this research work, we as scientists examine how computers store information in data structures called file-systems; and by such exploring, we shine a sobering light on important questions (all-too-often ignored by professional software engineers) about how fragile most people?s files really are.More importantly, we bring a message of hope for both now and the future: (1) Computer Science already provides the mathematical means to make our data safe, and (2) we can start developing new tools, and eventually a new approach to file-system design, which will make everyone?s information both safe and much easier to manage.
-
Using Cloud Computing To Develop A Botnet In the last decade, cloud computing has become very popular. Cloud computing is the usage of centrally located computers used for data storage and computing resources. Cloud computing is often used for web applications because it is a cheap option for using very powerful computers. In this research, we designed a botnet, a network of computers (bots) remotely controlled by one person (the bot master), that utilizes cloud computing. Bot masters often use botnets to spam email addresses, attack webservers, or distribute adware. It is often the bot master's goal to acquire as many bots as possible, usually by distributing malware to an unsuspecting victim's computers, because having more bots makes their botnet much more powerful. Using cloud computing, we are able to quickly create a very powerful botnet in minutes, without compromising anyone's computers.