A malicious behavior analysis based Cyber-I birth

被引:2
|
作者
Wen, Jie [1 ]
Ma, Jianhua [2 ]
Huang, Runhe [2 ]
Jin, Qun [3 ]
Chen, Jian [3 ]
Huang, Benxiong [1 ]
Zhong, Ning [4 ]
机构
[1] Huazhong Univ Sci & Technol, Dept Elect & Informat Engn, Wuhan 430074, Peoples R China
[2] Hosei Univ, Fac Comp & Informat Sci, Tokyo, Japan
[3] Waseda Univ, Fac Human Sci, Saitama, Japan
[4] Maebashi Inst Technol, Dept Life Sci & Informat, Maebashi, Gunma, Japan
关键词
Cyber-Individual; Behavior analysis; Honeypot; Cyber-I birth;
D O I
10.1007/s10845-012-0681-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber-Individual (Cyber-I) is the digital counterpart of an individual in the real world, which aims at systematically studying and developing comprehensive individual human modeling and its associated applications. The ultimate goal of this research is to create a digital clone for each individual and to provide active desirable services. We present a part of our research work focusing on examining the basic system architecture and the birth process of Cyber-I from a security perspective. In this study, a customized honeypot is used to record multidimensional data Cyber-I is constructed for a corresponding invader. Further, assembling a Cyber-I with associated CI-Applications enables aninvader having more behaviors in the honeypot and provides a possible chance to prolong activities of the invader, which complements a loop mechanism to feed Cyber-I for its growth. The preliminary result in this paper reveals that appropriate authorization and controls are extremely necessary to prevent Cyber-I from being maliciously used and to ensure privacy of its real individual in building an open Cyber-I platform.
引用
收藏
页码:147 / 155
页数:9
相关论文
共 50 条
  • [41] Trust-based distributed Kalman filtering for target tracking under malicious cyber attacks
    Liang, Chen
    Wen, Fuxi
    Wang, Zhongmin
    [J]. INFORMATION FUSION, 2019, 46 : 44 - 50
  • [42] Correlation based malicious traffic analysis system
    Arivudainambi, D.
    Kumar, K. A. Varun
    Satapathy, Suresh Chandra
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2021, 25 (02) : 195 - 200
  • [43] Automatic Detection and Analysis towards Malicious Behavior in IoT Malware
    Li, Sen
    Ge, Mengmeng
    Feng, Ruitao
    Li, Xiaohong
    Lam, Kwok Yan
    [J]. 2023 23RD IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW 2023, 2023, : 1332 - 1341
  • [44] METHOD FOR DETECTING THE OBFUSCATED MALICIOUS CODE BASED ON BEHAVIOR CONNECTION
    Li, Wenwu
    Li, Chao
    Duan, Miyi
    [J]. 2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2014, : 234 - 240
  • [45] A Malicious Code Detection Method Based on Ensemble Learning of Behavior
    Xu, Xiao-Bo
    Zhang, Wen-Bo
    He, Chao
    Luo, Yi
    [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2019, 42 (04): : 89 - 95
  • [46] Android App Malicious Behavior Detection Based on User Intention
    Fu, JianMing
    Li, PengWei
    Lin, Yan
    Ding, Shuang
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 560 - 567
  • [47] Behavior Based Darknet Traffic Decomposition for Malicious Events Identification
    Zhang, Ruibin
    Zhu, Lei
    Li, Xiaosong
    Pang, Shaoning
    Sarrafzadeh, Abdolhossein
    Komosny, Dan
    [J]. NEURAL INFORMATION PROCESSING, PT III, 2015, 9491 : 251 - 260
  • [48] A malicious code detection method based on integrated behavior characterization
    Liu, Wei-Wei
    Shi, Yong
    Guo, Yu
    Han, Zhen
    Shen, Chang-Xiang
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2009, 37 (04): : 696 - 700
  • [49] A Malicious Behavior Awareness and Defense Countermeasure Based on LoRaWAN Protocol
    Gao, Shu-Yang
    Li, Xiao-Hong
    Ma, Mao-De
    [J]. SENSORS, 2019, 19 (23)
  • [50] A New Automatic Detection System Design of Malicious Behavior Based on Software Behavior Sequence
    Jiang, Chong
    Qu, Qifu
    [J]. 2020 10TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2020, : 58 - 64