A malicious behavior analysis based Cyber-I birth

Jie Wen, Jianhua Ma, Runhe Huang, Qun Jin, Jian Chen, Benxiong Huang, Ning Zhong

    Research output: Contribution to journalArticle

    3 Citations (Scopus)

    Abstract

    Cyber-Individual (Cyber-I) is the digital counterpart of an individual in the real world, which aims at systematically studying and developing comprehensive individual human modeling and its associated applications. The ultimate goal of this research is to create a digital clone for each individual and to provide active desirable services. We present a part of our research work focusing on examining the basic system architecture and the birth process of Cyber-I from a security perspective. In this study, a customized honeypot is used to record multidimensional data Cyber-I is constructed for a corresponding invader. Further, assembling a Cyber-I with associated CI-Applications enables aninvader having more behaviors in the honeypot and provides a possible chance to prolong activities of the invader, which complements a loop mechanism to feed Cyber-I for its growth. The preliminary result in this paper reveals that appropriate authorization and controls are extremely necessary to prevent Cyber-I from being maliciously used and to ensure privacy of its real individual in building an open Cyber-I platform.

    Original languageEnglish
    Pages (from-to)147-155
    Number of pages9
    JournalJournal of Intelligent Manufacturing
    Volume25
    Issue number1
    DOIs
    Publication statusPublished - 2014 Feb

    Keywords

    • Behavior analysis
    • Cyber-I birth
    • Cyber-Individual
    • Honeypot

    ASJC Scopus subject areas

    • Artificial Intelligence
    • Software
    • Industrial and Manufacturing Engineering

    Cite this

    A malicious behavior analysis based Cyber-I birth. / Wen, Jie; Ma, Jianhua; Huang, Runhe; Jin, Qun; Chen, Jian; Huang, Benxiong; Zhong, Ning.

    In: Journal of Intelligent Manufacturing, Vol. 25, No. 1, 02.2014, p. 147-155.

    Research output: Contribution to journalArticle

    Wen, J, Ma, J, Huang, R, Jin, Q, Chen, J, Huang, B & Zhong, N 2014, 'A malicious behavior analysis based Cyber-I birth', Journal of Intelligent Manufacturing, vol. 25, no. 1, pp. 147-155. https://doi.org/10.1007/s10845-012-0681-2
    Wen, Jie ; Ma, Jianhua ; Huang, Runhe ; Jin, Qun ; Chen, Jian ; Huang, Benxiong ; Zhong, Ning. / A malicious behavior analysis based Cyber-I birth. In: Journal of Intelligent Manufacturing. 2014 ; Vol. 25, No. 1. pp. 147-155.
    @article{c9cd1ab424db40ff9aee3bc14804864c,
    title = "A malicious behavior analysis based Cyber-I birth",
    abstract = "Cyber-Individual (Cyber-I) is the digital counterpart of an individual in the real world, which aims at systematically studying and developing comprehensive individual human modeling and its associated applications. The ultimate goal of this research is to create a digital clone for each individual and to provide active desirable services. We present a part of our research work focusing on examining the basic system architecture and the birth process of Cyber-I from a security perspective. In this study, a customized honeypot is used to record multidimensional data Cyber-I is constructed for a corresponding invader. Further, assembling a Cyber-I with associated CI-Applications enables aninvader having more behaviors in the honeypot and provides a possible chance to prolong activities of the invader, which complements a loop mechanism to feed Cyber-I for its growth. The preliminary result in this paper reveals that appropriate authorization and controls are extremely necessary to prevent Cyber-I from being maliciously used and to ensure privacy of its real individual in building an open Cyber-I platform.",
    keywords = "Behavior analysis, Cyber-I birth, Cyber-Individual, Honeypot",
    author = "Jie Wen and Jianhua Ma and Runhe Huang and Qun Jin and Jian Chen and Benxiong Huang and Ning Zhong",
    year = "2014",
    month = "2",
    doi = "10.1007/s10845-012-0681-2",
    language = "English",
    volume = "25",
    pages = "147--155",
    journal = "Journal of Intelligent Manufacturing",
    issn = "0956-5515",
    publisher = "Springer Netherlands",
    number = "1",

    }

    TY - JOUR

    T1 - A malicious behavior analysis based Cyber-I birth

    AU - Wen, Jie

    AU - Ma, Jianhua

    AU - Huang, Runhe

    AU - Jin, Qun

    AU - Chen, Jian

    AU - Huang, Benxiong

    AU - Zhong, Ning

    PY - 2014/2

    Y1 - 2014/2

    N2 - Cyber-Individual (Cyber-I) is the digital counterpart of an individual in the real world, which aims at systematically studying and developing comprehensive individual human modeling and its associated applications. The ultimate goal of this research is to create a digital clone for each individual and to provide active desirable services. We present a part of our research work focusing on examining the basic system architecture and the birth process of Cyber-I from a security perspective. In this study, a customized honeypot is used to record multidimensional data Cyber-I is constructed for a corresponding invader. Further, assembling a Cyber-I with associated CI-Applications enables aninvader having more behaviors in the honeypot and provides a possible chance to prolong activities of the invader, which complements a loop mechanism to feed Cyber-I for its growth. The preliminary result in this paper reveals that appropriate authorization and controls are extremely necessary to prevent Cyber-I from being maliciously used and to ensure privacy of its real individual in building an open Cyber-I platform.

    AB - Cyber-Individual (Cyber-I) is the digital counterpart of an individual in the real world, which aims at systematically studying and developing comprehensive individual human modeling and its associated applications. The ultimate goal of this research is to create a digital clone for each individual and to provide active desirable services. We present a part of our research work focusing on examining the basic system architecture and the birth process of Cyber-I from a security perspective. In this study, a customized honeypot is used to record multidimensional data Cyber-I is constructed for a corresponding invader. Further, assembling a Cyber-I with associated CI-Applications enables aninvader having more behaviors in the honeypot and provides a possible chance to prolong activities of the invader, which complements a loop mechanism to feed Cyber-I for its growth. The preliminary result in this paper reveals that appropriate authorization and controls are extremely necessary to prevent Cyber-I from being maliciously used and to ensure privacy of its real individual in building an open Cyber-I platform.

    KW - Behavior analysis

    KW - Cyber-I birth

    KW - Cyber-Individual

    KW - Honeypot

    UR - http://www.scopus.com/inward/record.url?scp=84897629660&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=84897629660&partnerID=8YFLogxK

    U2 - 10.1007/s10845-012-0681-2

    DO - 10.1007/s10845-012-0681-2

    M3 - Article

    VL - 25

    SP - 147

    EP - 155

    JO - Journal of Intelligent Manufacturing

    JF - Journal of Intelligent Manufacturing

    SN - 0956-5515

    IS - 1

    ER -