The society of mind
A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior
IEEE Transactions on Software Engineering
Learning Program Behavior Profiles for Intrusion Detection
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
Detecting Kernel-Level Rootkits Through Binary Analysis
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
Semantics-Aware Malware Detection
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection
ECBS '07 Proceedings of the 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems
Toward Automated Dynamic Malware Analysis Using CWSandbox
IEEE Security and Privacy
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Catching Remote Administration Trojans (RATs)
Software—Practice & Experience
Cyber-Individual Meets Brain Informatics
IEEE Intelligent Systems
Smart u-things and ubiquitous intelligence
ICESS'05 Proceedings of the Second international conference on Embedded Software and Systems
Modeling High-Level Behavior Patterns for Precise Similarity Analysis of Software
ICDM '11 Proceedings of the 2011 IEEE 11th International Conference on Data Mining
Research challenges and perspectives on Wisdom Web of Things (W2T)
The Journal of Supercomputing
Hi-index | 0.00 |
Cyber-Individual (Cyber-I) is the digital counterpart of an individual in the real world, which aims at systematically studying and developing comprehensive individual human modeling and its associated applications. The ultimate goal of this research is to create a digital clone for each individual and to provide active desirable services. We present a part of our research work focusing on examining the basic system architecture and the birth process of Cyber-I from a security perspective. In this study, a customized honeypot is used to record multidimensional data Cyber-I is constructed for a corresponding invader. Further, assembling a Cyber-I with associated CI-Applications enables aninvader having more behaviors in the honeypot and provides a possible chance to prolong activities of the invader, which complements a loop mechanism to feed Cyber-I for its growth. The preliminary result in this paper reveals that appropriate authorization and controls are extremely necessary to prevent Cyber-I from being maliciously used and to ensure privacy of its real individual in building an open Cyber-I platform.