September 10, 2015

Future of Security Chapter

  • Clougherty M.
  • Pratt B.

Human behavioral evolution is increasingly dependent on the information that defines us as individuals, communities, or enterprises. The volume of stored data per capita has been growing and will continue to grow at a staggering rate, as humans effectively evolve into digital hoarders. Consequently, the richness of this data makes it a valuable target for those who may want to exploit it for financial or political purposes, and, conversely, the loss of control of this information can have devastating financial and/or social consequences to its owner. As a result of the value of this information, bulk botnet-driven Distributed Denial of Service type of attacks that bring down specific web servers for political or economic reasons are no longer the dominant concern. Furthermore, indiscriminate phishing attacks aimed at stealing arbitrary sets of credentials are no longer as threatening on their own as people become more cautious about accessing sites or opening attachments based on email message. However, a more targeted phishing attack to gain credentials that are used as part of a subsequent targeted attack - a so-called Advanced Persistent Threat attack is potentially devastating. These attacks target specific high value information and, unlike the bulk attacks of the past, the perpetrators of these attacks are ever more sophisticated, well financed criminals, hacktivists, competitors and even governments that will take advantage of the massively increased threat surface that is created by ultra-connectivity of users and devices and the future prevalence of simple, poorly-secured IoT devices connected to the network and cloud services. Fortunately, there is hope in countering this threat through technology and cooperation. In an Us versus Them world, there are simply more of Us those trying to protect data than there are of Them those trying to steal it. We believe that this numerical advantage will form the basis of the solution, by employing massively scalable stream analytics in the edge cloud to detect the presence of attackers and by intensifying widespread sharing of this information among cloud and network providers, shifting the balance away from the attackers. The increasing use of end to end encryption is an attempt to protect the privacy of user data in transit between two points. However, perversely this also makes it difficult for security tools to effectively monitor networks for evidence of infiltration and compromised devices. Thus, the great irony of our age is that the very mechanisms consumers and web services are using to try to protect our data and privacy may actually put our information at greater risk. In the future, approaches will be needed that allow users to provide multiple levels of encryption that permit limited access of information by explicitly negotiated trusted parties. This will form one component of a comprehensive end-to-end security architecture that encompasses end point device and server and cloud network-based security functions that we discuss in this chapter. Finally, we will consider the recent advances in quantum computing devices and consider the impact on current encryption techniques in a post-quantum computing world.

Recent Publications

January 01, 2019

Friendly, appealing or both? Characterising user experience in sponsored search landing pages

  • Bron M.
  • Chute M.
  • Evans H.
  • Lalmas M.
  • Redi M.
  • Silvestri F.

© 2017 International World Wide Web Conference Committee (IW3C2), published under Creative Commons CC BY 4.0 License. Many of today's websites have recognised the importance of mobile friendly pages to keep users engaged and to provide a satisfying user experience. However, next to the experience provided by the sites themselves, ...

January 01, 2019

Analyzing uber's ride-sharing economy

  • Aiello L.
  • Djuric N.
  • Grbovic M.
  • Kooti F.
  • Lerman K.
  • Radosavljevic V.

© 2017 International World Wide Web Conference Committee (IW3C2), published under Creative Commons CC BY 4.0 License. Uber is a popular ride-sharing application that matches people who need a ride (or riders) with drivers who are willing to provide it using their personal vehicles. Despite its growing popularity, there exist ...

January 01, 2019

The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race

  • Cresci S.
  • Petrocchi M.
  • Pietro R.
  • Spognardi A.
  • Tesconi M.

© 2017 International World Wide Web Conference Committee (IW3C2), published under Creative Commons CC BY 4.0 License. Recent studies in social media spam and automation provide anecdotal argumentation of the rise of a new generation of spambots, so-called social spambots. Here, for the first time, we extensively study this novel ...