2013
DOI: 10.1007/978-3-642-40588-4_17
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace

Abstract: Abstract. Cyberspace is a borderless new universe in which all actors, including States, share information and communications technologies, now indispensable to the modern lifestyle. Starting from the beginning of the 21st century, the ability to leverage the cyberspace has become the most important source of power. Due to the proliferation of ICT systems into all aspects of life, the importance of information for political matters has increased awfully. State and non-State actors can use this power to achieve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…Honeypots serve to deflect attacks from hitting the systems they are protecting as well as serving as a means for gaining information about attackers by storing a record of their activity and learning what types of attacks and software tools the attacker is using. The goal of this type of honeypots is to lure an attacker to install either handler or agent code within the honeypot, thereby allowing the honeypot's [17] owner to track the handler or agent behavior and better understand how to defend against future DDoS installation attacks. Honeypots are also helpful because they can store event logfiles during a DDoS attack.…”
Section: The Proposed Solutionmentioning
confidence: 99%
See 1 more Smart Citation
“…Honeypots serve to deflect attacks from hitting the systems they are protecting as well as serving as a means for gaining information about attackers by storing a record of their activity and learning what types of attacks and software tools the attacker is using. The goal of this type of honeypots is to lure an attacker to install either handler or agent code within the honeypot, thereby allowing the honeypot's [17] owner to track the handler or agent behavior and better understand how to defend against future DDoS installation attacks. Honeypots are also helpful because they can store event logfiles during a DDoS attack.…”
Section: The Proposed Solutionmentioning
confidence: 99%
“…As we have explained in a previous paper [17] the analysis cycle takes place in 6 steps (see Figure 5) Step 1 -Identification of the target.…”
Section: The Proposed Solutionmentioning
confidence: 99%
“…e-banking and e-payment systems) are becoming the norm in developing and developed nations. Such systems and services can and have been targeted by cyber criminals [1]- [6], and malware is a popular or common tool used by cyber criminals [7]- [9]. For example, a cyber-attack in South Korea reportedly saw 32,000 computers belonging to broadcasting organizations and banks infected with a malware that overwrote the Master Boot Record (MBR) [8].…”
Section: Introductionmentioning
confidence: 99%
“…However, several threats have proven that many people's passwords are vulnerable to being cracked. Thus the security of user's information is threatened all the time [1].…”
Section: Introductionmentioning
confidence: 99%