BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:Searching for Evil - Ross Anderson and Richard Clayton\, Computer 
 Laboratory\, University of Cambridge
DTSTART:20080116T141500Z
DTEND:20080116T151500Z
UID:TALK9615@talks.cam.ac.uk
CONTACT:Timothy G. Griffin
DESCRIPTION:(work with Tyler Moore and Shishir Nagaraja)\n\nComputer secur
 ity has recently imported a lot of ideas from economics\,\npsychology and 
 sociology\, leading to fresh insights and new tools. We\nwill describe one
  thread of research that draws together techniques\nfrom fields as diverse
  as signals intelligence and sociology to search\nfor artificial communiti
 es.\n\nEvildoers online divide roughly into two categories - those who don
 't\nwant their websites to be found\, such as phishermen\, and those who d
 o.\nThe latter category runs from fake escrow sites through dodgy stores\n
 to postmodern Ponzi schemes. A few of them buy ads\, but many set up\nfake
  communities in the hope of having victims driven to their sites\nfor free
 . How can these reputation thieves be detected?\n\nSome of our work in sec
 urity economics and social networking may give\nan insight into the practi
 cal effects of network topology. These tie\nup in various ways with traffi
 c analysis\, long used by the signals\nintelligence agencies which trawl t
 he airwaves and networks looking\nfor interesting targets. We'll describe 
 a number of dubious business\nenterprises we've unearthed. Recent advances
  in algorithms\, such as\nNewman's modularity matrix\, have increased the 
 robustness of covert\ncommunity detection. But much scope remains for wron
 gdoers to hide\nthemselves better as they become topologically aware\; we 
 can expect\nattack and defence to go through several rounds of coevolution
 . We'll\ntherefore end up by talking about some strategic issues\, such as
  the\nextent to which search engines and other service providers could\, o
 r\nshould\, share information in the interests of wickedness detection.\n\
 n(This talk was given as a google tech talk in August 2007 and is "here":h
 ttp://video.google.com/videoplay?docid=-1380463341028815296)\n\n	
LOCATION:Lecture Theatre 1\, Computer Laboratory
END:VEVENT
END:VCALENDAR
