Modeling malicious activities in cyber space
Data(s) |
01/01/2015
|
---|---|
Resumo |
Cyber attacks are an unfortunate part of society as an increasing amount of critical infrastructure is managed and controlled via the Internet. In order to protect legitimate users, it is critical for us to obtain an accurate and timely understanding of our cyber opponents. However, at the moment we lack effective tools to do this. In this article we summarize the work on modeling malicious activities from various perspectives, discuss the pros and cons of current models, and present promising directions for possible efforts in the near future. |
Identificador | |
Idioma(s) |
eng |
Publicador |
IEEE |
Relação |
http://dro.deakin.edu.au/eserv/DU:30082060/yu-modelingmalicious-2015.pdf http://doi.org/10.1109/MNET.2015.7340429 |
Direitos |
2015, IEEE |
Palavras-Chave | #Science & Technology #Technology #Computer Science, Hardware & Architecture #Computer Science, Information Systems #Engineering, Electrical & Electronic #Telecommunications #Computer Science #Engineering |
Tipo |
Journal Article |