Content area
Full Text
J Intell Manuf (2014) 25:147155 DOI 10.1007/s10845-012-0681-2
A malicious behavior analysis based Cyber-I birth
Jie Wen Jianhua Ma Runhe Huang Qun Jin
Jian Chen Benxiong Huang Ning Zhong
Received: 5 March 2012 / Accepted: 2 July 2012 / Published online: 15 July 2012 Springer Science+Business Media, LLC 2012
Abstract Cyber-Individual (Cyber-I) is the digital counterpart of an individual in the real world, which aims at systematically studying and developing comprehensive individual human modeling and its associated applications. The ultimate goal of this research is to create a digital clone for each individual and to provide active desirable services. We present a part of our research work focusing on examining the basic system architecture and the birth process of Cyber-I from a security perspective. In this study, a customized honeypot is used to record multidimensional data Cyber-I is constructed for a corresponding invader. Further, assembling a Cyber-I with associated CI-Applications enables an invader
J. Wen (B) B. Huang
Department of Electronic and Information Engineering, Huazhong University of Science & Technology, Wuhan, Chinae-mail: [email protected]
B. Huange-mail: [email protected]
J. Ma R. Huang
Faculty of Computer and Information Science, Hosei University, Tokyo, Japane-mail: [email protected]
R. Huange-mail: [email protected]
Q. Jin J. Chen
Faculty of Human Sciences, Waseda University, Tokorozawa, Saitama, Japane-mail: [email protected]
J. Chene-mail: [email protected]
N. ZhongDepartment of Life Science and Informatics, Maebashi Institute of Technology, Maebashi, Japane-mail: [email protected]
having more behaviors in the honeypot and provides a possible chance to prolong activities of the invader, which complements a loop mechanism to feed Cyber-I for its growth. The preliminary result in this paper reveals that appropriate authorization and controls are extremely necessary to prevent Cyber-I from being maliciously used and to ensure privacy of its real individual in building an open Cyber-I platform.
Keywords Cyber-Individual Behavior analysis
Honeypot Cyber-I birth
Introduction
While the physical world and cyber world are gradually integrating and merging, a new world called hyperworld is forming (Kunii et al. 1996). With emerging explosive of information and service, many human-centric researches were carried out and focused on realizing the harmonious symbiosis of human-computers-things (Zhong et al. 2010; Shtykh and Jin 2011). Living in hyperworld, everyone may have a Cyber-Individual (hereon Cyber-I or CI) as a cyber-counterpart, who is supposed to know one more and better, and to...