Cyber-Security Threats Origins and their Analysis

被引:1
|
作者
Cerget, Maros [1 ]
Hudec, Jan [1 ]
机构
[1] Slovak Univ Technol Bratislava, Fac Informat & Informat Technol, Ilkovicova 2, Bratislava 84216, Slovakia
关键词
geolocation; threat origin analysis; cyber threats; public sources; public lists; information gathering; suspicious IP addresses;
D O I
10.12700/APH.20.9.2023.9.2
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The number of cyber-attacks on the Internet increases greatly and this trend does not seem to stop any time soon. The spread of malware is fuelled by various factors, with the technology and Internet access becoming relatively affordable globally and forced homeoffice of various professions, which increases the possible threat exposure time. Threat actors also employ various attack vectors, often utilizing some form of position deception to hide their activity from the authorities. Depending on the attacker's skillset, motivation and available resources, the attack may prevail into successful data breach, theft or data integrity violation. These outcomes may sometimes have tragic consequences. Without access to any kind of private data banks, this work was limited only to publicly available sources alongside with their drawbacks. This paper proposes a tool which is able to accept various sources of data, be it providers of suspicious IP address lists, lists containing IP addresses that are known to be part of any kind of TOR/VPN network, blocklists that contain various data and lastly also geolocation databases as means of gathering intel about IP addresses that are either part of suspicious lists or inside of manual queries. The proposed tool was then tested on publicly available data and the results, originating mainly from generated maps and graphs of various categories, alongside with the actual tool were compared to other cyberthreats origin information services and to other statistics about the situation in the online field.
引用
收藏
页码:23 / 41
页数:19
相关论文
共 50 条
  • [1] Repercussions of Coronavirus on Cyber-Security Threats
    Pandharipande, Aryan
    Parashar, Ritik
    [J]. BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (14): : 45 - 48
  • [2] IEC 61850: Technology Standards and Cyber-Security Threats
    Youssef, Tarek A.
    El Hariri, Mohamad
    Bugay, Nicole
    Mohammed, O. A.
    [J]. 2016 IEEE 16TH INTERNATIONAL CONFERENCE ON ENVIRONMENT AND ELECTRICAL ENGINEERING (EEEIC), 2016,
  • [3] Cyber-security on smart grid: Threats and potential solutions
    Gunduz, Muhammed Zekeriya
    Das, Resul
    [J]. COMPUTER NETWORKS, 2020, 169 (169)
  • [4] Data Analysis for Network Cyber-security
    Dietz, Sebastian
    [J]. JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES A-STATISTICS IN SOCIETY, 2016, 179 (03) : 878 - 878
  • [5] Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture
    Alahmadi, Adel N.
    Rehman, Saeed Ur
    Alhazmi, Husain S.
    Glynn, David G.
    Shoaib, Hatoon
    Sole, Patrick
    [J]. SENSORS, 2022, 22 (09)
  • [6] Social Cyber-Security
    Carley, Kathleen M.
    Cervone, Guido
    Agarwal, Nitin
    Liu, Huan
    [J]. SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, SBP-BRIMS 2018, 2018, 10899 : 389 - 394
  • [7] REGULATING CYBER-SECURITY
    Sales, Nathan Alexander
    [J]. NORTHWESTERN UNIVERSITY LAW REVIEW, 2013, 107 (04) : 1503 - 1568
  • [8] Cyber-security threat
    Klebba, Jesse
    [J]. CHEMISTRY & INDUSTRY, 2017, 81 (10) : 9 - 9
  • [9] Cyber-Security and Privacy
    Lopez, Javier
    Martinelli, Fabio
    Samarati, Pierangela
    [J]. ERCIM NEWS, 2015, (100): : 10 - 11
  • [10] Cyber-Security Analysis of Transactive Energy Systems
    Krishnan, V. V. G.
    Zhang, Y.
    Kaur, K.
    Hahn, A.
    Srivastava, A.
    Sindhu, S.
    [J]. 2018 IEEE/PES TRANSMISSION AND DISTRIBUTION CONFERENCE AND EXPOSITION (T&D), 2018,