A malicious behavior analysis based Cyber-I birth

被引:2
|
作者
Wen, Jie [1 ]
Ma, Jianhua [2 ]
Huang, Runhe [2 ]
Jin, Qun [3 ]
Chen, Jian [3 ]
Huang, Benxiong [1 ]
Zhong, Ning [4 ]
机构
[1] Huazhong Univ Sci & Technol, Dept Elect & Informat Engn, Wuhan 430074, Peoples R China
[2] Hosei Univ, Fac Comp & Informat Sci, Tokyo, Japan
[3] Waseda Univ, Fac Human Sci, Saitama, Japan
[4] Maebashi Inst Technol, Dept Life Sci & Informat, Maebashi, Gunma, Japan
关键词
Cyber-Individual; Behavior analysis; Honeypot; Cyber-I birth;
D O I
10.1007/s10845-012-0681-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber-Individual (Cyber-I) is the digital counterpart of an individual in the real world, which aims at systematically studying and developing comprehensive individual human modeling and its associated applications. The ultimate goal of this research is to create a digital clone for each individual and to provide active desirable services. We present a part of our research work focusing on examining the basic system architecture and the birth process of Cyber-I from a security perspective. In this study, a customized honeypot is used to record multidimensional data Cyber-I is constructed for a corresponding invader. Further, assembling a Cyber-I with associated CI-Applications enables aninvader having more behaviors in the honeypot and provides a possible chance to prolong activities of the invader, which complements a loop mechanism to feed Cyber-I for its growth. The preliminary result in this paper reveals that appropriate authorization and controls are extremely necessary to prevent Cyber-I from being maliciously used and to ensure privacy of its real individual in building an open Cyber-I platform.
引用
收藏
页码:147 / 155
页数:9
相关论文
共 50 条
  • [1] A malicious behavior analysis based Cyber-I birth
    Jie Wen
    Jianhua Ma
    Runhe Huang
    Qun Jin
    Jian Chen
    Benxiong Huang
    Ning Zhong
    [J]. Journal of Intelligent Manufacturing, 2014, 25 : 147 - 155
  • [2] Growth Scheduling and Processing in Cyber-I Modeling
    Huang, Wei
    Ma, Jianhua
    Huang, Runhe
    Yang, Laurence T.
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2016, : 1267 - 1272
  • [3] Cyber-I: Vision of the Individual's Counterpart on Cyberspace
    Wen, Jie
    Ming, Kai
    Wang, Furong
    Huang, Benxiong
    Ma, Jianhua
    [J]. EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 295 - +
  • [4] Awareness and Control of Personal Data Based on the Cyber-I Privacy Model
    Tang, Li
    Ma, Jianhua
    Huang, Runhe
    Apduhan, Bernady O.
    Li, He
    Cheng, Shaoyin
    [J]. 2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 456 - 463
  • [5] Me, Myself, & Cyber-I: A Craft Analysis of Narrative Persona in Creative Nonfiction
    Keisner, Jody
    [J]. NEW WRITING-THE INTERNATIONAL JOURNAL FOR THE PRACTICE AND THEORY OF CREATIVE WRITING, 2015, 12 (02): : 193 - 204
  • [6] From User Models to the Cyber-I Model: Approaches, Progresses and Issues
    Guo, Ao
    Ma, Jianhua
    Wang, Kevin I-Kai
    [J]. 2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 33 - 40
  • [7] Incremental User Modeling of Online Activity for Cyber-I Growth with Successive Browsing Logs
    Tsan, Yen
    Guo, Ao
    Ma, Jianhua
    Huang, Runhe
    Chen, Zhong
    [J]. 2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 26 - 32
  • [8] Privacy-preserved and Best-effort Provisions of Cyber-I Information to Personalized Services
    Liu, Wenjing
    Ma, Jianhua
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON DATA SCIENCE AND DATA INTENSIVE SYSTEMS, 2015, : 218 - 225
  • [9] Malicious Behavior Analysis of Android GUI Based on ADB
    Yang, Li
    Wang, Lijun
    Zhang, Dongdong
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 147 - 153
  • [10] Malicious behavior analysis method based on program semantic
    Institute of Computer Science and Technology, Peking University, Beijing 100871, China
    [J]. Beijing Daxue Xuebao Ziran Kexue Ban, 2008, 4 (537-542):