{"id":1468,"date":"2020-06-19T08:08:03","date_gmt":"2020-06-19T15:08:03","guid":{"rendered":"https:\/\/ant.isi.edu\/blog\/?p=1468"},"modified":"2020-10-14T14:43:45","modified_gmt":"2020-10-14T21:43:45","slug":"congratulations-to-calvin-ardi-for-his-new-phd","status":"publish","type":"post","link":"https:\/\/ant.isi.edu\/blog\/?p=1468","title":{"rendered":"congratulations to Calvin Ardi for his new PhD"},"content":{"rendered":"\n<p>I would like to congratulate Dr. Calvin Ardi for defending his PhD in April 2020 and completing his doctoral dissertation \u201cImproving Network Security through Collaborative Sharing\u201d&nbsp;in June 2020.<\/p>\n\n\n\n<p>From the abstract:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"221\" class=\"wp-image-1469\" style=\"width: 400px;\" src=\"https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2020\/06\/t6171003_cropped.png\" alt=\"\" srcset=\"https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2020\/06\/t6171003_cropped.png 1776w, https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2020\/06\/t6171003_cropped-300x166.png 300w, https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2020\/06\/t6171003_cropped-1024x566.png 1024w, https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2020\/06\/t6171003_cropped-768x424.png 768w, https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2020\/06\/t6171003_cropped-1536x848.png 1536w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><figcaption>Calvin Ardi and John Heidemann (inset), after Calvin filed his PhD dissertation.<\/figcaption><\/figure\/<\/figure><\/div>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>As our world continues to become more interconnected through the<br \/>Internet, cybersecurity incidents are correspondingly increasing in<br \/>number, severity, and complexity. The consequences of these attacks<br \/>include data loss, financial damages, and are steadily moving from the<br \/>digital to the physical world, impacting everything from public<br \/>infrastructure to our own homes. The existing mechanisms in<br \/>responding to cybersecurity incidents have three problems: they<br \/>promote a security monoculture, are too centralized, and are too slow.<\/p><\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><br \/>In this thesis, we show that improving one&#8217;s network security strongly<br \/>benefits from a combination of personalized, local detection, coupled<br \/>with the controlled exchange of previously-private network information<br \/>with collaborators. We address the problem of a security monoculture<br \/>with personalized detection, introducing diversity by tailoring to the<br \/>individual&#8217;s browsing behavior, for example. We approach the problem<br \/>of too much centralization by localizing detection, emphasizing<br \/>detection techniques that can be used on the client device or local<br \/>network without reliance on external services. We counter slow<br \/>mechanisms by coupling controlled sharing of information with<br \/>collaborators to reactive techniques, enabling a more efficient<br \/>response to security events.<\/p><\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><br \/>We prove that we can improve network security by demonstrating our<br \/>thesis with four studies and their respective research contributions<br \/>in malicious activity detection and cybersecurity data sharing. In<br \/>our first study, we develop <em>Content Reuse Detection<\/em>, an approach to<br \/>locally discover and detect duplication in large corpora and apply our<br \/>approach to improve network security by detecting &#8220;bad<br \/>neighborhoods&#8221; of suspicious activity on the web. Our second study<br \/>is <em>AuntieTuna<\/em>, an anti-phishing browser tool that implements personalized,<br \/>local detection of phish with user-personalization and improves<br \/>network security by reducing successful web phishing attacks. In our<br \/>third study, we develop <em>Retro-Future<\/em>, a framework for controlled information<br \/>exchange that enables organizations to control the risk-benefit<br \/>trade-off when sharing their previously-private data. Organizations<br \/>use Retro-Future to share data within and across collaborating organizations,<br \/>and improve their network security by using the shared data to<br \/>increase detection&#8217;s effectiveness in finding malicious activity.<br \/>Finally, we present <em>AuntieTuna2.0<\/em> in our fourth study, extending the proactive<br \/>detection of phishing sites in AuntieTuna with data sharing between friends.<br \/>Users exchange previously-private information with collaborators to<br \/>collectively build a defense, improving their network security and<br \/>group&#8217;s collective immunity against phishing attacks.<\/p><\/blockquote>\n\n\n\n<p>Calvin defended his PhD when USC was on work-from-home due to COVID-19; he is the second ANT student with a fully on-line PhD defense.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I would like to congratulate Dr. Calvin Ardi for defending his PhD in April 2020 and completing his doctoral dissertation \u201cImproving Network Security through Collaborative Sharing\u201d&nbsp;in June 2020. From the abstract: Calvin Ardi and John Heidemann (inset), after Calvin filed his PhD dissertation.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[285],"tags":[71,212,219,80,157,58,191,67,267,79,140,18,57],"class_list":["post-1468","post","type-post","status-publish","format-standard","hentry","category-students","tag-datasets","tag-dissertation","tag-gawseed","tag-graduation","tag-impact","tag-isi","tag-lacanic","tag-lacrend","tag-mega","tag-phd","tag-phishing","tag-security","tag-usc"],"_links":{"self":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1468"}],"version-history":[{"count":3,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1468\/revisions"}],"predecessor-version":[{"id":1547,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1468\/revisions\/1547"}],"wp:attachment":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1468"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1468"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}