Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace

Abstract : Cyberspace is a borderless new universe in which all actors, including States, share information and communications technologies, now indispensable to the modern lifestyle. Starting from the beginning of the 21st century, the ability to leverage the cyberspace has become the most important source of power. Due to the proliferation of ICT systems into all aspects of life, the importance of information for political matters has increased awfully. State and non-State actors can use this power to achieve objectives into cyberspace and physical world. Low cost and high potential impact make cyber-power attractive to all actors. In fact, cyber threats have grown exponentially with the proliferation of the cyberspace infrastructures. Consequently, cyberspace has become a war-fighting domain with the potential to destroy or make useless logical, physical, technical, and virtual infrastructure, damaging in fact critical National capabilities.This scenario forces all national institutions to a review of their defense strategies, because of the difficulties to identify the actors of a cyber-attack. It then becomes necessary to gain a broader view of the problem to acquire more detailed information, useful to identify such sources of cyber-attacks. This new point of view can be achieved by using the analytical method developed by the authors and applied to data streams flowing across the cyberspace. In this way we can collect, detect, isolate and analyze the behavior of those malware that are acting as cyber weapons, through the implementation of an honeypot-based system such as the one presented in this paper.
Liste complète des métadonnées

Cited literature [34 references]  Display  Hide  Download

https://hal.inria.fr/hal-01506705
Contributor : Hal Ifip <>
Submitted on : Wednesday, April 12, 2017 - 11:07:17 AM
Last modification on : Friday, February 15, 2019 - 3:36:08 PM
Document(s) archivé(s) le : Thursday, July 13, 2017 - 12:32:22 PM

File

978-3-642-40588-4_17_Chapter.p...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

  • HAL Id : hal-01506705, version 1

Citation

Clara Colombini, Antonio Colella, Marco Mattiucci, Aniello Castiglione. Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace. 1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.236-252. ⟨hal-01506705⟩

Share

Metrics

Record views

104

Files downloads

4723