A malicious behavior analysis based Cyber-I birth

  • Authors:
  • Jie Wen;Jianhua Ma;Runhe Huang;Qun Jin;Jian Chen;Benxiong Huang;Ning Zhong

  • Affiliations:
  • Department of Electronic and Information Engineering, Huazhong University of Science & Technology, Wuhan, China;Faculty of Computer and Information Science, Hosei University, Tokyo, Japan;Faculty of Computer and Information Science, Hosei University, Tokyo, Japan;Faculty of Human Sciences, Waseda University, Tokorozawa, Japan;Faculty of Human Sciences, Waseda University, Tokorozawa, Japan;Department of Electronic and Information Engineering, Huazhong University of Science & Technology, Wuhan, China;Department of Life Science and Informatics, Maebashi Institute of Technology, Maebashi, Japan

  • Venue:
  • Journal of Intelligent Manufacturing
  • Year:
  • 2014

Quantified Score

Hi-index 0.00

Visualization

Abstract

Cyber-Individual (Cyber-I) is the digital counterpart of an individual in the real world, which aims at systematically studying and developing comprehensive individual human modeling and its associated applications. The ultimate goal of this research is to create a digital clone for each individual and to provide active desirable services. We present a part of our research work focusing on examining the basic system architecture and the birth process of Cyber-I from a security perspective. In this study, a customized honeypot is used to record multidimensional data Cyber-I is constructed for a corresponding invader. Further, assembling a Cyber-I with associated CI-Applications enables aninvader having more behaviors in the honeypot and provides a possible chance to prolong activities of the invader, which complements a loop mechanism to feed Cyber-I for its growth. The preliminary result in this paper reveals that appropriate authorization and controls are extremely necessary to prevent Cyber-I from being maliciously used and to ensure privacy of its real individual in building an open Cyber-I platform.