A malicious behavior analysis based Cyber-I birth

被引:0
|
作者
Jie Wen
Jianhua Ma
Runhe Huang
Qun Jin
Jian Chen
Benxiong Huang
Ning Zhong
机构
[1] Huazhong University of Science & Technology,Department of Electronic and Information Engineering
[2] Hosei University,Faculty of Computer and Information Science
[3] Waseda University,Faculty of Human Sciences
[4] Maebashi Institute of Technology,Department of Life Science and Informatics
来源
关键词
Cyber-Individual; Behavior analysis; Honeypot; Cyber-I birth;
D O I
暂无
中图分类号
学科分类号
摘要
Cyber-Individual (Cyber-I) is the digital counterpart of an individual in the real world, which aims at systematically studying and developing comprehensive individual human modeling and its associated applications. The ultimate goal of this research is to create a digital clone for each individual and to provide active desirable services. We present a part of our research work focusing on examining the basic system architecture and the birth process of Cyber-I from a security perspective. In this study, a customized honeypot is used to record multidimensional data Cyber-I is constructed for a corresponding invader. Further, assembling a Cyber-I with associated CI-Applications enables aninvader having more behaviors in the honeypot and provides a possible chance to prolong activities of the invader, which complements a loop mechanism to feed Cyber-I for its growth. The preliminary result in this paper reveals that appropriate authorization and controls are extremely necessary to prevent Cyber-I from being maliciously used and to ensure privacy of its real individual in building an open Cyber-I platform.
引用
收藏
页码:147 / 155
页数:8
相关论文
共 50 条
  • [31] Coordinated cyber-physical attack on power grids based on malicious power dispatch
    Wang, Xiaoliang
    Xue, Fei
    Lu, Shaofeng
    Jiang, Lin
    Bompard, Ettore
    Masera, Marcelo
    Wu, Qigang
    [J]. INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2024, 155
  • [32] Detection of Malicious Attacks in Autonomous Cyber-Physical Inverter-Based Microgrids
    Zografopoulos, Ioannis
    Konstantinou, Charalambos
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) : 5815 - 5826
  • [33] Agent-based approach to conforming behavior analysis in a cyber-market
    Terano, T
    Kurahashi, S
    [J]. PROCEEDINGS OF THE FIFTH JOINT CONFERENCE ON INFORMATION SCIENCES, VOLS 1 AND 2, 2000, : A887 - A890
  • [34] Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery System
    Ullah, Sharif
    Shetty, Sachin
    Nayak, Anup
    Hassanzadeh, Amin
    Hasan, Kamrul
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 146 - 160
  • [35] Behavior-Based Detection for Malicious Script-Based Attack
    Yoon, Soojin
    Choo, Hyun-lock
    Bae, Hanchul
    Kim, Hwankuk
    [J]. ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 97 - 103
  • [36] BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports
    Raulin, Vincent
    Gimenez, Pierre-Francois
    Han, Yufei
    Tong, Valerie Viet Triem
    [J]. PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 417 - 424
  • [37] Correlation based malicious traffic analysis system
    Arivudainambi, D.
    Kumar, K. A. Varun
    Satapathy, Suresh Chandra
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2021, 25 (02) : 195 - 200
  • [38] Automatic Detection and Analysis towards Malicious Behavior in IoT Malware
    Li, Sen
    Ge, Mengmeng
    Feng, Ruitao
    Li, Xiaohong
    Lam, Kwok Yan
    [J]. 2023 23RD IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW 2023, 2023, : 1332 - 1341
  • [39] Trust-based distributed Kalman filtering for target tracking under malicious cyber attacks
    Liang, Chen
    Wen, Fuxi
    Wang, Zhongmin
    [J]. INFORMATION FUSION, 2019, 46 : 44 - 50
  • [40] METHOD FOR DETECTING THE OBFUSCATED MALICIOUS CODE BASED ON BEHAVIOR CONNECTION
    Li, Wenwu
    Li, Chao
    Duan, Miyi
    [J]. 2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2014, : 234 - 240