Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace - Security Engineering and Intelligence Informatics Access content directly
Conference Papers Year : 2013

Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace

Antonio Colella
  • Function : Author
  • PersonId : 1006175
Marco Mattiucci
  • Function : Author
  • PersonId : 1006176
Aniello Castiglione
  • Function : Author
  • PersonId : 1003158

Abstract

Cyberspace is a borderless new universe in which all actors, including States, share information and communications technologies, now indispensable to the modern lifestyle. Starting from the beginning of the 21st century, the ability to leverage the cyberspace has become the most important source of power. Due to the proliferation of ICT systems into all aspects of life, the importance of information for political matters has increased awfully. State and non-State actors can use this power to achieve objectives into cyberspace and physical world. Low cost and high potential impact make cyber-power attractive to all actors. In fact, cyber threats have grown exponentially with the proliferation of the cyberspace infrastructures. Consequently, cyberspace has become a war-fighting domain with the potential to destroy or make useless logical, physical, technical, and virtual infrastructure, damaging in fact critical National capabilities.This scenario forces all national institutions to a review of their defense strategies, because of the difficulties to identify the actors of a cyber-attack. It then becomes necessary to gain a broader view of the problem to acquire more detailed information, useful to identify such sources of cyber-attacks. This new point of view can be achieved by using the analytical method developed by the authors and applied to data streams flowing across the cyberspace. In this way we can collect, detect, isolate and analyze the behavior of those malware that are acting as cyber weapons, through the implementation of an honeypot-based system such as the one presented in this paper.
Fichier principal
Vignette du fichier
978-3-642-40588-4_17_Chapter.pdf (422.02 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01506705 , version 1 (12-04-2017)

Licence

Attribution

Identifiers

  • HAL Id : hal-01506705 , version 1

Cite

Clara Maria Colombini, Antonio Colella, Marco Mattiucci, Aniello Castiglione. Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace. 1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.236-252. ⟨hal-01506705⟩
123 View
5086 Download

Share

Gmail Facebook X LinkedIn More