IN765 Knowledge Networks Introductions Judith Molka-Danielsen 2005 Reference: LINKED by Albert-László Barábasi.

Slides:



Advertisements
Similar presentations
Unit 6 Digital Literacy Study S3 Obj 1
Advertisements

Internet and Intranets. In this session our learning objectives are Internet and Intranets Connection Methods Hardware Software Connections Browsers Information.
Complex Networks Advanced Computer Networks: Part1.
Scale Free Networks.
INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Network Basics.
Project Ideas slides modified from Eileen Kraemer and David P. Feldman.
$200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $500 $100 Category One Category Two Category.
Small Worlds Presented by Geetha Akula For the Faculty of Department of Computer Science, CALSTATE LA. On 8 th June 07.
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
Orientation to Online Learning An Instructors Guide.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION Lecture # 1 (
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
SOCIAL NETWORKING APP FACEBOOK. WHAT IS FACEBOOK Facebook was created in 2004 by Mark Zuckerburg and was first used on computers. It was one of the first.
Yvan Cartwright, Web Security Introduction Correct encryption use Guide to passwords Dictionary hacking Brute-force hacking.
1. An Idea “In order to create wealth, you must be the first with an idea. Then, you must be first to tell the world about that idea” Warren Buffett “…probably.
E-Commerce. What is E-Commerce Industry Canada version Commercial activity conducted over networks linking electronic devices (usually computers.) Simple.
The Internet Present By Tianyi Xiao ID : C  The Internet is a global system of interconnected computer networks that use the standard Internet.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Viruses.
Comparing modem and other technologies
1 INTERNET AND WORLD WIDE WEB TECHNOLOGIES BUS Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
Exploring the Network.
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
Section 4 – Computer Networks Setting up a small network.
Network Analysis Diffusion Networks. Social Network Philosophy Social structure is visible in an anthill Movements & contacts one sees are not random.
Introduction To Internet
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources Usually, the connections.
Introduction to Computers COMP 900 St. Lawrence College Lecture Two: Networking and the Internet.
Improvement of Employment Chances of the Unemployed and the Visual and Audible Disabled by using Virtual Learning Applications Some basic data concerning.
Canadian Society for Social Development
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
IP BROS Presentation by: Amen Ahmed. Mario and Luigi are here to help us find our way through the internet. Mario will act as our browser and Luigi will.
Networks.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
200 pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt 400 pt 500 pt 100 pt 200pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt.
CASE – year old charged with hacking Prosecutors: Katrina Prather Sterlin Sanders John Young.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Using Social Media for Fundraising and Communication with Supporters Lindsay Boyle – Communications & Research Coordinator Claire Chapman – Information.
The Internet Teaching Learning Seminar Computer Studies.
CS5038 The Electronic Society Lecture: Social Networking Lecture Outline Social Networking Service Social Networking Sites –Bebo –Friendster –MySpace Social.
Business Math 3-3 Online banking. Goal Calculate account balance needed to make online payments.
THE INTERNET INTRODUCTION TO BUSINESS TECHNOLOGY.
The Internet is a Big Collection of Computers and Cables. -"interconnection of computer networks". Millions of personal, business, and governmental.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
 Internet –INTERnational NETwork is the network of computer networks.  It is a Wide Area Network(WLAN).You can have unlimited access to internet. 
Introduction to Networking. What is a Network? Discuss in groups.
Md. Abdul Kader Lecturer Department of English King’s College Sub: English First Paper Class:
Marion County Public Schools Acceptable Use Guidelines for Network Access.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
G063 - Intranets, the Internet and Extranet. Learning Objectives: At the end of this topic you should be able to: describe the characteristics and purpose.
ICT in Product Manufacture ISDN, LAN, WAN, Intranets and extranets, global networks
Technical Implementation: Security Risks
Chapter 1: Explore the Network
Network and hardware revision
Chapter 1: Exploring the Network
Common Methods Used to Commit Computer Crimes
Unit 6 Digital Literacy Study S3 Obj 2-2
Unit 6 Digital Literacy Study S3 Obj 2-2
Project Ideas slides modified from Eileen Kraemer and David P. Feldman.
Presentation transcript:

IN765 Knowledge Networks Introductions Judith Molka-Danielsen 2005 Reference: LINKED by Albert-László Barábasi

Denial of Service Attacks on the Internet

How vulnerable are we to such attacks? BBC News: Thursday, 13 September, 2001, UK 'Mafiaboy' hacker jailed A Canadian hacker nicknamed Mafiaboy has been sentenced to eight months in a youth detention centre. Judge Gilles Ouellet ruled that the 17-year-old teenager from Montreal committed a criminal act when he crippled major internet sites like Amazon and Yahoo last year, causing an estimated $1.7 billion in damages. Denial-of-service attacks Mafiaboy admitted involvement in denial-of-service attacks last year against websites belonging to several companies, including Amazon, Dell and eBay. The sites were bombarded with thousands of simultaneous messages, which prevented users from accessing them for up to five hours. Other charges involved illegal use of computers to help with the attacks. The judge also ordered the teenager to face one year of probation after his detention ends, and fined him $160. We think it is a reasonable ruling. It sends a strong message to hackers that they will get caught if they do things like that Prosecutor Louis Miville- Deschenes

Social Networks and Technology Networks: Paul spreading the word, he did not walk randomly.

Important features of Networks The structure and topology of networks –Seeing the whole and not just the parts (not just reductionism). The ability to navigate them (search, find). –Mapping networks – mapping the interconnectivity – helps us to navigate them.

How are maps useful? Maps of the Internet show the points of vulnerability to hackers Maps of organizations of trade and ownership show trails of power (who affects the outcome of markets). Maps of links between species in nature show the affects of mankind activities on ecosystems. Maps of genes in cells show insight into how diseases grow. Surprise: There can be many structural similarities in these diverse maps. Many networks have common characteristics of complex networks.

Complex Systems Share characteristics of many parts and many interconnectivities. Often in nature these interconnectivities are not at random; they often follow laws of self-organization.

Maps of Complex Networks: neurons, electric power grid, Internet, … Internet by Bill Cheswick Neurons by Ricard New York state power grid

Types of Networks.. Social Networks Friends, families, colleagues Logical Networks Web-pages, P2P- file sharing Physical Resources Internet IP routers, circuit switches, electricity, wireless telephony TransportRoads, railroads, airlines EconomicFirms, markets, organizations

Why Study the Structural Characteristics of Networks? Availability and vulnerability of services: electric, telephone, air connections, etc. Preventing or stopping of viruses on data networks. The importance of weak ties: connectivness to the core, finding a job, finding a web page. The characterization (Mapping) of network structure can lead to a better understanding of –the role of hubs in the spreading an idea, –the proliferation of a product in a market, or –to better management of organizations.

Resources for In765 The book LINKED is a conversational outline of the basic concepts of the course. We will use this to guide are area of study. Resources on the web: like NetVis map software, Java/JUNG, and other visualization systems have to be explored for your use. I have pointers to some, and you may find others. Some references from our course web page, `Statistical Mechanics of Complex Networks´ and `Introduction to Social Network Methods´, contain more details of the theory and math behind the concepts. You can select a student project that matches your skills and interests.

Examples of previous projects Student Presented Lecture Presented Outline – written due Present Date Bernt Louis Berge Søvik Yes Collaborative Researchers - Comparative24.11 (O) Tommy Kvalvik YesInternet Routers - IP Adr. -Overload18.11 (H) Ronny Hanset Ringen YesOrkut Friends -cluster by country24.11 (O) Tor Erik Olsen Smørholm YesVulnerability and Downtime on Uninett24.11 (O) Kristian Kristoffersen Yes Rule18.11 (H) Thomas Håseth Johansen Yes Information Spread Study18.11 (H) Øystein Kaldhol Yes BITTORRENT - Lifecycle Analysis (H) Geir-Arild Hellesvik Yes Virus Simulation - Spreading - Stopping24.11 (O) Pål Elnan Yes Instant Msging - Brass Bands - work/play24.11 (O)