Cybersecurity and network measurement : problematic in so many ways
Envie de télécharger cette vidéo sur votre ordinateur ? Cliquez ici (poids : 1.6 Go)
In this talk, I will discuss the challenges placed on us when the goal is to find anomalies in the Internet. The challenges are statistical, methodological and ethical.
Firstly, today's Internet is vastly more complex (not just larger) than its original designers expected. The number of applications numbers in the millions. Systems increasingly involve machine-to-machine communication as well as human-to-human, or simple information retrieval. Thus the dimensionality of the system is massive, and the definition of an "anomaly" is itself non-trivial. Secondly, the scale requires us to limit measurement to sampling, and yet as we've just observed, we have dynamic, high dimensionality data. What to sample, where and when, is increasingly non-obvious. This leads to the third strand of the talk, which is that the most successful measurement methods we have found in the last decade also represent a fairly extensive invasion of privacy, and are subject both to ethical and to legal constraints.
And yet the Internet is a critical resource upon which society, for social, economic and practical reasons depends. Just as other utilities (water, electricity) require careful protection, the Internet needs care and attention. The old Jon Postel principle "be conservative in what you send, and liberal in what you accept" is a fine guiding design saying, but unfortunately, there are many intentional and unintentional behaviours in today's net which are a long way from that ideal, and understanding (and possibly repairing them) seems to be ever more important.
The talk is based on work in the EU Marie-Curie METRICS project, which is an international training network for PhDs that has been looking at requirements for network measurement and sharing of data, and held a summer school in Estonia in 2015 on Cybersecurity.
Orateur(s) : Jon Crowcroft
Public : Tous
Date : 19 Janvier 2016
Lieu : Jussieu Amphi 25
- Le temps et les événements en informatique
- Le génie mathématique, du théorème des quatre couleurs à la classification des groupes
- Unifying logic and probability: A “New Dawn” for Artificial Intelligence?
- Taking Education Online: A Unique Opportunity for the New Millenium
- Lauréat prix Gilles Kahn 2012 : Camille Couprie
- Lauréat prix Gilles Kahn 2012 : Mathilde Noual
- Lauréat prix Gilles Kahn 2012 : Mathieu Feuillet
- Gilles Dowek: Are formal methods the future of air traffic control?
- Tony Hoare: Laws of concurrent system design
- On the Preservation of Digital Information
- L'information mentale
- Myths about MOOCs and Software Engineering Education
- Toward a Theory of Trust in Networks of Humans and Computers
- Computer Science: All Questions Answered
- Fluidization of discrete event models or a marriage between the discrete and the continuous
- Vers des bases de connaissances personnelles
- The new era of biology is computational
- Proofs, Secrets, and Computation
- Desperately seeking software perfection
- Les informaticiennes, de la dominance de classe aux discriminations de sexe
- Cybersecurity and network measurement : problematic in so many ways
- Really Big Data Analytics on Graphs with Trillions of Edges
- Robots that exceed human capabilities
- "Chirps" everywhere
- Abstract interpretation
- What Makes Digital Inclusion Good Or Bad? Liste détaillée.
En savoir +
Si vous rencontrez des problèmes pour visualiser la vidéo, nous vous recommandons de mettre à jour Flash Player