杏吧视频

Skip to main content
cyber-attack

Fighting the cybersecurity battle

FEATURED | January 20, 2021
STORY BY: EDITORIAL STAFF

National Science Foundation funds 杏吧视频 team working to stop data breaches, protect customer information

A pair of 杏吧视频 computer researchers want to develop a better defense against big data breaches鈥攁nd the National Science Foundation (NSF) is intrigued enough to support their efforts. 

Xusheng Xiao and Yinghui Wu, assistant professors in the Department of Computer and Data Sciences at the Case School of Engineering, received a three-year, $500,000 NSF grant to investigate the viability of their approach to build a better defense system.

They鈥檙e working on teaching computer networks to adapt to future breaches by learning details of previously unknown past criminal invasions into the system. These stealth attacks can be discovered hidden in vast system-audit logs kept by every computer operating system. 

These system-audit logs (sometimes called monitoring logs or activity logs) reveal every single action on a computer, resulting in a storehouse of sometimes millions of lines of data that the human eye would have trouble deciphering. 

Xusheng Xiao 1
Xusheng Xiao

鈥淭he operating system has the answers, but they鈥檝e just been buried in the monitoring log,鈥 Xiao said. 鈥淭hink of it like what a security camera does: It produces recordings for an entire 24 hours, but you only need and want to see the time period of the break-ins, and just before, so you can see the bad guys as they arrive. We鈥檙e doing the same thing by reviewing the system-audit logs.鈥

While other research teams鈥攂oth academic and private鈥攁re also working to solve the problem of large databases being hacked, Xiao said their approach is unique.

First of all, it uses an automated algorithm that can filter out in real time the tens of thousands of 鈥渞egular鈥 actions of a computer and isolate the unusual ones.

Second, their algorithm goes a step further by asking 鈥渨hat if?鈥 and 鈥渨hy?鈥 questions of the system in addition to 鈥渨hat鈥 and 鈥渨here鈥 information gleaned from existing searches.

鈥淲e鈥檙e designing a smart algorithm that traces the reasons for the appearance of certain files in the logs,鈥 Wu said. 鈥淭his has not been done before.鈥

Mining the monitoring log

Yinghui Wu
Yinghui Wu

Data breaches have been big news as they鈥檝e occurred at a dizzying pace in recent years: From the , which resulted in the theft of personal information of 70 million customers, to the to the long and growing . 

But these incidents are not, or rarely, the failure of the traditional anti-virus software most of us have on our personal computers or even a gap in the heftier versions installed by institutions. Viruses, in fact, often reveal and implicate the less skillful attacker, experts like Xiao and Wu say.

Instead, these thefts are the work of hackers who secretly navigate an individual computer鈥檚 files, enter into the network and slowly remove sensitive data that can compromise the identity or financial well-being of millions of customers.

鈥淩ight now, people have the impression that if they install antivirus software that they are OK,鈥 Xiao said. 鈥淏ut hackers are looking for other vulnerabilities, like if you鈥檙e using an old version of Windows.鈥

Then, he said, the cyber criminals buy a tool on the black market to skirt past the older Windows software. And, once inside, they start copying a limited number of files each day, so that the person or company doesn鈥檛 even know they are there.

The system being designed at 杏吧视频 would notice that entry and help build defenses against it, Wu said.

They hope to someday turn their real-time monitoring system into a marketable product for corporations, data security companies and possibly individuals.


For more information, contact Mike Scott at mike.scott@case.edu.

This article was originally published Dec. 14, 2020.