DocumentCode :
3611620
Title :
Modeling malicious activities in cyber space
Author :
Shui Yu ; Guojun Wang ; Wanlei Zhou
Author_Institution :
Deakin Univ., Melbourne, VIC, Australia
Volume :
29
Issue :
6
fYear :
2015
Firstpage :
83
Lastpage :
87
Abstract :
Cyber attacks are an unfortunate part of society as an increasing amount of critical infrastructure is managed and controlled via the Internet. In order to protect legitimate users, it is critical for us to obtain an accurate and timely understanding of our cyber opponents. However, at the moment we lack effective tools to do this. In this article we summarize the work on modeling malicious activities from various perspectives, discuss the pros and cons of current models, and present promising directions for possible efforts in the near future.
Keywords :
Internet; computer network security; critical infrastructures; Internet; critical infrastructure; cyber attack; cyber space; malicious activity modeling; Biological system modeling; Complexity theory; Computer crime; IP networks; Internet; Network topology;
fLanguage :
English
Journal_Title :
Network, IEEE
Publisher :
ieee
ISSN :
0890-8044
Type :
jour
DOI :
10.1109/MNET.2015.7340429
Filename :
7340429
Link To Document :
بازگشت