A malicious behavior analysis based Cyber-I birth

被引:0
|
作者
Jie Wen
Jianhua Ma
Runhe Huang
Qun Jin
Jian Chen
Benxiong Huang
Ning Zhong
机构
[1] Huazhong University of Science & Technology,Department of Electronic and Information Engineering
[2] Hosei University,Faculty of Computer and Information Science
[3] Waseda University,Faculty of Human Sciences
[4] Maebashi Institute of Technology,Department of Life Science and Informatics
来源
关键词
Cyber-Individual; Behavior analysis; Honeypot; Cyber-I birth;
D O I
暂无
中图分类号
学科分类号
摘要
Cyber-Individual (Cyber-I) is the digital counterpart of an individual in the real world, which aims at systematically studying and developing comprehensive individual human modeling and its associated applications. The ultimate goal of this research is to create a digital clone for each individual and to provide active desirable services. We present a part of our research work focusing on examining the basic system architecture and the birth process of Cyber-I from a security perspective. In this study, a customized honeypot is used to record multidimensional data Cyber-I is constructed for a corresponding invader. Further, assembling a Cyber-I with associated CI-Applications enables aninvader having more behaviors in the honeypot and provides a possible chance to prolong activities of the invader, which complements a loop mechanism to feed Cyber-I for its growth. The preliminary result in this paper reveals that appropriate authorization and controls are extremely necessary to prevent Cyber-I from being maliciously used and to ensure privacy of its real individual in building an open Cyber-I platform.
引用
收藏
页码:147 / 155
页数:8
相关论文
共 50 条
  • [1] A malicious behavior analysis based Cyber-I birth
    Wen, Jie
    Ma, Jianhua
    Huang, Runhe
    Jin, Qun
    Chen, Jian
    Huang, Benxiong
    Zhong, Ning
    [J]. JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (01) : 147 - 155
  • [2] Growth Scheduling and Processing in Cyber-I Modeling
    Huang, Wei
    Ma, Jianhua
    Huang, Runhe
    Yang, Laurence T.
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2016, : 1267 - 1272
  • [3] Awareness and Control of Personal Data Based on the Cyber-I Privacy Model
    Tang, Li
    Ma, Jianhua
    Huang, Runhe
    Apduhan, Bernady O.
    Li, He
    Cheng, Shaoyin
    [J]. 2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 456 - 463
  • [4] Cyber-I: Vision of the Individual's Counterpart on Cyberspace
    Wen, Jie
    Ming, Kai
    Wang, Furong
    Huang, Benxiong
    Ma, Jianhua
    [J]. EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 295 - +
  • [5] Me, Myself, & Cyber-I: A Craft Analysis of Narrative Persona in Creative Nonfiction
    Keisner, Jody
    [J]. NEW WRITING-THE INTERNATIONAL JOURNAL FOR THE PRACTICE AND THEORY OF CREATIVE WRITING, 2015, 12 (02): : 193 - 204
  • [6] From User Models to the Cyber-I Model: Approaches, Progresses and Issues
    Guo, Ao
    Ma, Jianhua
    Wang, Kevin I-Kai
    [J]. 2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 33 - 40
  • [7] Incremental User Modeling of Online Activity for Cyber-I Growth with Successive Browsing Logs
    Tsan, Yen
    Guo, Ao
    Ma, Jianhua
    Huang, Runhe
    Chen, Zhong
    [J]. 2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 26 - 32
  • [8] Malicious Behavior Analysis of Android GUI Based on ADB
    Yang, Li
    Wang, Lijun
    Zhang, Dongdong
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 147 - 153
  • [9] Privacy-preserved and Best-effort Provisions of Cyber-I Information to Personalized Services
    Liu, Wenjing
    Ma, Jianhua
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON DATA SCIENCE AND DATA INTENSIVE SYSTEMS, 2015, : 218 - 225
  • [10] LSTM Android Malicious Behavior Analysis Based on Feature Weighting
    Yang, Qing
    Wang, Xiaoliang
    Zheng, Jing
    Ge, Wenqi
    Bai, Ming
    Jiang, Frank
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (06): : 2188 - 2203