کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
10342402 696068 2015 13 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Graph-theoretic characterization of cyber-threat infrastructures
ترجمه فارسی عنوان
خصوصیات گراف نظری زیرساخت های تهدید اینترنتی
کلمات کلیدی
تجزیه و تحلیل تروجان، زیرساخت تهدید سایبری، نظریه گراف، نمودار اثر انگشت، تشخیص هویت سایبری،
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
چکیده انگلیسی
In this paper, we investigate cyber-threats and the underlying infrastructures. More precisely, we detect and analyze cyber-threat infrastructures for the purpose of unveiling key players (owners, domains, IPs, organizations, malware families, etc.) and the relationships between these players. To this end, we propose metrics to measure the badness of different infrastructure elements using graph theoretic concepts such as centrality concepts and Google PageRank. In addition, we quantify the sharing of infrastructure elements among different malware samples and families to unveil potential groups that are behind specific attacks. Moreover, we study the evolution of cyber-threat infrastructures over time to infer patterns of cyber-criminal activities. The proposed study provides the capability to derive insights and intelligence about cyber-threat infrastructures. Using one year dataset, we generate notable results regarding emerging threats and campaigns, important players behind threats, linkages between cyber-threat infrastructure elements, patterns of cyber-crimes, etc.
ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Digital Investigation - Volume 14, Supplement 1, August 2015, Pages S3-S15
نویسندگان
, , , , , ,