Cybersecurity Revolution – 24 Hours Live Streaming Event – Day II

Date: 

Fri, 01/06/2018 (All day)

 

The Cybersecurity Revolution is an event conceived to openly encourage sharing and interaction among the wider cybersecurity research community. It is an event focused around research, education, science and learning and not the furthering of commercial interests. The presentations can include information about research centers and their objectives, achievements, agendas and roadmaps; overviews and deep dives into past and present research themes and studies; graduate students and their research; discussions related to the theme. Presentations must promote education and sharing across the research community and commit to elevate accuracy, precision, and specificity in sciences related to cybersecurity. Presentations which promote a commercial product, company, entity or service or formulated for commercial benefit will not be included as part of the event.

Cybersecurity practitioners and researchers are spread across the world. Getting everyone together is time-consuming and costly. This conference is a first effort to bring together the best in cybersecurity to share ideas using the power of the Internet.

Click here to read the Summary

For the event website click here.

Click here to see the full Cybersecurity Revolution event agenda

Click here to see the HUJI Cyber Security Reasearch Center May 31st Agenda

 

Participants (Click on the logo to see the paticipant's live event or homepage):

Cyber_Logocyber_logo    Cardiff Logo   UNB LogoTNO LOGO nscr_logovu-amsterdam logo     UdeM logo    concordia logo     KnowledgeFlow Logo     UQAM logo        Universidad EAN logo     albertacouncil_logo    DKS LOGO        Calgary Logo      Flinders Logo     deakin logo    monash_logo      anulogo     swinburne_university_of_technology     acic_logo    unil_logo     Hallym Logo

 

The HUJI Cybers Security Reasearch Center Agenda (June 1st; Israel Daylight Time):

12:00-12:45
Dr. Amit Rechavi – The Secondary Global Market for Hacked Data (Watch the Lecture)
Cybercrime and hacking have become ubiquitous over the past decades. Although many studies have explored hacking communities, only a few have investigated hacking networks on the country and cross-country levels. We collected data on successful brute-force attacks (BFAs) and system-trespassing incidents (Sessions) on honeypots (HPs). Based on one million interactions in one month, we built a network of hackers and hacked data depicting the different roles of countries in the hacking scene. We depicted a suspected data exchange between the BFA and Session hackers and examined the network’s topology in light of this data transfer. Mapping IP addresses and countries, we found that only a few countries lead the hacking activities and are the network’s core. Our contribution lies in studying and mapping the dynamics of hacking activity on the country level and in providing insights into the dynamic of the underground trading in usernames and passwords. Due to the severe consequences of hacking activities, our findings carry both criminological-practical and technological-theoretical implications.

 

Watch the Lectures:

 

The Full Cybersecurity Revolution Event Agenda.