首页> 外文会议>International Conference on Computational Science >Cyber Attribution from Topological Patterns
【24h】

Cyber Attribution from Topological Patterns

机译:拓扑模式的网络归因

获取原文

摘要

We developed a crawler to collect live malware distribution network data from publicly available sources including Google Safe Browser and Vir-usTotal. We then generated a dynamic graph with our visualization tool and performed malware attribution analysis. We found: 1) malware distribution networks form clusters rather than a single network; 2) those cluster sizes follow the Power Law; 3) there is a correlation between cluster size and the number of malware species in the cluster; 4) there is a correlation between the number of malware species and cyber events; and finally, 5) infrastructure components such as bridges, hubs, and persistent links play significant roles in malware distribution dynamics.
机译:我们开发了一个爬虫,用于从包括Google安全浏览器和Vir-usTotal在内的公共来源收集实时恶意软件分发网络数据。然后,我们使用可视化工具生成了一个动态图,并进行了恶意软件归因分析。我们发现:1)恶意软件分发网络形成群集而不是单个网络; 2)这些集群的大小遵循幂律; 3)群集大小与群集中恶意软件种类的数量之间存在相关性; 4)恶意软件种类的数量与网络事件之间存在相关性;最后,5)基础结构组件(例如网桥,集线器和持久链接)在恶意软件分发动态中起着重要作用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号