Modeling malicious activities in cyber space


Autoria(s): Yu, Shui; Wang, Guojun; Zhou, Wanlei
Data(s)

01/01/2015

Resumo

Cyber attacks are an unfortunate part of society as an increasing amount of critical infrastructure is managed and controlled via the Internet. In order to protect legitimate users, it is critical for us to obtain an accurate and timely understanding of our cyber opponents. However, at the moment we lack effective tools to do this. In this article we summarize the work on modeling malicious activities from various perspectives, discuss the pros and cons of current models, and present promising directions for possible efforts in the near future.

Identificador

http://hdl.handle.net/10536/DRO/DU:30082060

Idioma(s)

eng

Publicador

IEEE

Relação

http://dro.deakin.edu.au/eserv/DU:30082060/yu-modelingmalicious-2015.pdf

http://doi.org/10.1109/MNET.2015.7340429

Direitos

2015, IEEE

Palavras-Chave #Science & Technology #Technology #Computer Science, Hardware & Architecture #Computer Science, Information Systems #Engineering, Electrical & Electronic #Telecommunications #Computer Science #Engineering
Tipo

Journal Article