首页> 外文会议>Security engineering and intelligence informatics >Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace
【24h】

Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace

机译:网络威胁监控:网络空间中恶意软件行为的实验分析

获取原文
获取原文并翻译 | 示例

摘要

Cyberspace is a borderless new universe in which all actors, including States, share information and communications technologies, now indispensable to the modern lifestyle. Starting from the beginning of the 21st century, the ability to leverage the cyberspace has become the most important source of power. Due to the proliferation of ICT systems into all aspects of life, the importance of information for political matters has increased awfully. State and non-State actors can use this power to achieve objectives into cyberspace and physical world. Low cost and high potential impact make cyber-power attractive to all actors. In fact, cyber threats have grown exponentially with the proliferation of the cyberspace infrastructures. Consequently, cyberspace has become a war-fighting domain with the potential to destroy or make useless logical, physical, technical, and virtual infrastructure, damaging in fact critical National capabilities. This scenario forces all national institutions to a review of their defense strategies, because of the difficulties to identify the actors of a cyber-attack. It then becomes necessary to gain a broader view of the problem to acquire more detailed information, useful to identify such sources of cyber-attacks. This new point of view can be achieved by using the analytical method developed by the authors and applied to data streams flowing across the cyberspace. In this way we can collect, detect, isolate and analyze the behavior of those malware that are acting as cyber weapons, through the implementation of an honeypot-based system such as the one presented in this paper.
机译:网络空间是一个无国界的新宇宙,所有行为者,包括国家在内,都共享信息和通信技术,这些信息和通信技术现已成为现代生活方式所不可缺少的。从21世纪初开始,利用网络空间的能力已成为最重要的动力来源。由于信息通信技术系统已渗透到生活的各个方面,信息对于政治事务的重要性已大大提高。国家和非国家行为者可以利用这种权力来实现进入网络空间和物理世界的目标。低成本和高潜在影响使网络力量对所有参与者都具有吸引力。实际上,随着网络空间基础设施的扩散,网络威胁呈指数增长。因此,网络空间已成为战争领域,有可能破坏或使无用的逻辑,物理,技术和虚拟基础设施,实际上损害国家关键能力。由于难以识别网络攻击的参与者,这种情况迫使所有国家机构对其防御策略进行审查。然后,有必要对问题进行更广泛的了解以获取更详细的信息,这对于识别此类网络攻击的来源很有用。这种新的观点可以通过使用作者开发的分析方法来实现,并应用于流经网络空间的数据流。通过这种基于蜜罐的系统(如本文所述),我们可以收集,检测,隔离和分析那些充当网络武器的恶意软件的行为。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号