대구한의대학교 향산도서관

상세정보

부가기능

Addressing Device Compromise from the Perspective of Large Organizations

상세 프로파일

상세정보
자료유형학위논문
서명/저자사항Addressing Device Compromise from the Perspective of Large Organizations.
개인저자DeKoven, Louis Floyd.
단체저자명University of California, San Diego. Computer Science and Engineering.
발행사항[S.l.]: University of California, San Diego., 2019.
발행사항Ann Arbor: ProQuest Dissertations & Theses, 2019.
형태사항129 p.
기본자료 저록Dissertations Abstracts International 81-02B.
Dissertation Abstract International
ISBN9781085605229
학위논문주기Thesis (Ph.D.)--University of California, San Diego, 2019.
일반주기 Source: Dissertations Abstracts International, Volume: 81-02, Section: B.
Advisor: Savage, Stefan
이용제한사항This item must not be added to any third party search indexes.This item must not be added to any third party search indexes.This item must not be sold to any third party vendors.This item must not be sold to any third party vendors.
요약Addressing compromised device is a problem for virtually all large organizations. Compromised devices can propagate malware resulting in theft of computing resources, loss of sensitive data, and extortion of money. Unfortunately, large organizations do not have an oracle into device compromise. Instead, organizations must address compromise without straightforward answers to critical questions such as: "Is this device compromised?", "Why/How is this device compromised?", "What's the correct intervention?". This problem, in part, results from limited observational vantage points, differences in intervention capabilities, and evolving adversaries with differing incentives. In this dissertation, I develop systems that empirically address multiple types of device compromise using large-scale observations within different organizations, thus placing us on a stronger footing to devise better interventions. I first describe an approach used at Facebook for detecting malicious browsers extensions. I present a methodology whereby users exhibiting suspicious online behaviors are scanned (with permission) to identify extensions in their browsers, and those extensions are in turn labeled based on the threat indicators they contain. Employing this methodology at Facebook I identify more than 1,700 lexically distinct malicious extensions, and use this labeling to drive user device clean-up efforts as well notify browser vendors. Next, I examine for-profit services offering to artificially manipulate a user's social standing on Instagram. I identify the techniques used by these services to drive social actions, detail how they are structured to evade straightforward detection, and characterize the dynamics of their customer base. Finally, I construct controlled experiments to disrupt these services and analyze how different approaches to intervention can drive different reactions, thus providing distinct trade-offs for defenders. Lastly, I describe a large-scale measurement of 15,000 laptop and desktop devices on a university's network to characterize the prevalence of security "best practices" and security-relevant behaviors, and quantify how they relate to device compromise. I use passive network traffic analysis techniques to infer a broad range of device features and per-machine compromise state. I find a number of behaviors positively correlate with host compromise, and few "best practices" exhibit negative correlations that would support their value in improving end user security.
일반주제명Computer science.
Computer engineering.
언어영어
바로가기URL : 이 자료의 원문은 한국교육학술정보원에서 제공합니다.

서평(리뷰)

  • 서평(리뷰)

태그

  • 태그

나의 태그

나의 태그 (0)

모든 이용자 태그

모든 이용자 태그 (0) 태그 목록형 보기 태그 구름형 보기
 
로그인폼