首页> 外文期刊>Journal of Theoretical and Applied Information Technology >AN INVESTIGATION OF DIGITAL FORENSICS FOR SHAMOON ATTACK BEHAVIOUR IN FOG COMPUTING AND THREAT INTELLIGENCE FOR INCIDENT RESPONSE
【24h】

AN INVESTIGATION OF DIGITAL FORENSICS FOR SHAMOON ATTACK BEHAVIOUR IN FOG COMPUTING AND THREAT INTELLIGENCE FOR INCIDENT RESPONSE

机译:雾气计算中血腥攻击行为的数字取证调查与威胁情报响应

获取原文
           

摘要

Cyber related crimes are increasing nowadays. Thus digital forensics has been employed in solving cybercrimes. Several researches have been done where they have analysed cyber related attacks, malware types, etc. Researches based on studying and analysing Advanced Persistent Threats (APTs), especially Shamoon attack. This research has been done in order to study and analyse the attacking behaviour of Shamoon malware in fog computing using FPSO (Frequency Particles Swarm Optimization) based on Travelling Salesman approach (TSP). In this proposed system, fog nodes are initiated where the nodes delivers three types of data namely industrial, medical and educational data. Secondly Shamoon attack is created followed by distance matrix evaluation. As the Shamoon attack focuses on attacking industrial data, the attack distribution movement focuses mainly on industrial data. After the evaluation, priorities of the particles should be assigned randomly. Once FPSO parameters are initialized, objective function of every particle is evaluated. The FPSO mechanism implements the working procedure of TSP. Under the FPSO mechanism, swap and insertion operations are performed. In order to find the best shortest path, nearest neighbouring algorithm is used, which follows evaluation of fitness function. After evaluation, local best lbest and global best gbest solutions are obtained. Finally, appropriate positions and velocities are updated. From the resultant optimum path, the distribution of Shamoon attack movement can be analysed. The performance of this proposed system has been evaluated by estimating the fitness value, best cost. The attack distribution of Shamoon data has been observed. Then finally a threat intelligence scheme is proposed for the investigating and analysis behaviour and spread of Shamoon attacks in edges of Fog computing.
机译:网络犯罪现今越来越多。因此,数字取证在解决网络犯罪被采用。一些研究已经完成,他们分析了网络相关的攻击,恶意软件类型等的研究基础上研究和分析高级持续性威胁(APT),尤其是Shamoon攻击。这项研究是为了研究和基于旅行商办法(TSP)使用FPSO(频率粒子群算法)计算分析大雾Shamoon恶意软件的攻击行为已经完成。在此提出的系统,雾节点开始,其中节点提供三种类型的数据,即工业,医疗和教育数据。其次Shamoon攻击创建其次是距离矩阵评价。由于Shamoon攻击的重点攻击的工业数据,攻分布运动主要集中在工业数据。评估后,颗粒的优先级应该被随机分配。一旦FPSO参数进行初始化,每个粒子的目标函数进行评估。该FPSO机制实现TSP的工作程序。根据该FPSO机制,交换和插入的动作。为了找到最好的最短路径,最近邻算法使用,它遵循适应度函数的评价。评估后,获得当地最佳lbest和全球最佳GBEST解决方案。最后,适当的位置和速度更新。从得到的最佳路径,Shamoon攻击运动的分布进行分析。这个提议系统的性能已经被估算适应值,最佳的成本进行评估。 Shamoon数据的攻击分布进行了观察。后来终于威胁情报方案,提出了在雾计算的边缘的调查和分析行为和Shamoon攻击传播。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号