Advertisement

Peer-to-Peer Networking and Applications

, Volume 11, Issue 2, pp 210–219 | Cite as

General Theory of security and a study of hacker’s behavior in big data era

  • Yixian Yang
  • Xinxin Niu
  • Lixiang Li
  • Haipeng Peng
  • Jingfeng Ren
  • Haochun Qi
Article

Abstract

Big data brings great value as well as a lot of network security problems, which makes the hacker possess more and more attack strategies. This paper precisely describes the static form of hackers, and proposes the best dynamic hackers attack tactics under certain assumptions. When the proportion of the hacker’s resource input is its static probability distribution value, the hacker income reaches maximum. In particular, on the premise of uniform ratio of input and output, if the entropy of hacker reduces 1 bit, the hacker income will be double. Furthermore, this paper studies the optimal combination of hacker attacks and proposes a logarithmic optimal combination attack strategy that the hacker attacks several systems simultaneously. This strategy not only can maximize the hacker’s overall income, but also can maximize the income of each round attack. We find that the input-output ratio of each system will not change at the end of this round attack when hacker adopts the logarithmic optimal combination strategy, and find the growth rate of additional hacker income does not exceed the mutual information between the input-output ratio of the attacked system and the inedge information if an attacker can get some inedge information through other ways. Moreover, there is an optimum attack growth rate of hackers if time-varying attacked system is a stationary stochastic process. We can conclude that, in Big Data era, the more information the hacker gets, the more hacker income.

Keywords

Big data Network security problems Logarithmic optimal combination attack strategy 

Notes

Acknowledgments

The authors grateful thank the reviewers for their valuable comments. This paper is supported by the National Natural Science Foundation of China (Grant nos. 61472045 and 61573067), the National Key Research and Development Program (Grant nos. 2016YFB0800602 and 2016YFB0800604), the Beijing City Board of Education Science and Technology Key Project (Grant no. KZ201510015015), and the Beijing City Board of Education Science and Technology Project (Grant no. KM201510015009).

References

  1. 1.
    Kim H W, Chan H C, Gupta S (2007) Value-based adoption of mobile internet: an empirical investigation. Decis Support Syst 43(1):111–126CrossRefGoogle Scholar
  2. 2.
    Atzori L, Iera A, Morabito G (2010) The internet of things: A survey. Comput Netw 54(15):2787–2805CrossRefMATHGoogle Scholar
  3. 3.
    Demirkan H, Delen D (2013) Leveraging the capabilities of service-oriented decision support systems: Putting analytics and big data in cloud. Decis Support Syst 55(1):412–421CrossRefGoogle Scholar
  4. 4.
    Li H, Yang Y, Luan T, Liang X, Zhou L, Shen X (2015) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data, IEEE Transactions on Dependable and Secure Computing. doi: 10.1109/TDSC.2015.2406704
  5. 5.
    Li H, Liu D, Dai Y, Luan T H (2015) Engineering Searchable Encryption of Mobile Cloud Networks: When QoE Meets QoP. IEEE Wirel Commun 22(4):74–80CrossRefGoogle Scholar
  6. 6.
    Ivan P L P, Candy Q, Wang Q-H (2006) Tang Hackers, Users, Information Security, Workshop on the Economics of Information SecurityGoogle Scholar
  7. 7.
    Applegate S (2011) Cybermilitias and political hackers: Use of irregular forces in cyberwarfare. IEEE Secur Priv 9(5):16–22CrossRefGoogle Scholar
  8. 8.
    McKenzie, Wark, Hackers (2006) Theory. Cult Soc 23(2-3):320–322CrossRefGoogle Scholar
  9. 9.
    Yang Y, Peng H, Li L, Niu X (2016) General Theory of Security and a Study Case in Internet of Things, IEEE Internet of Things Journal, AcceptGoogle Scholar
  10. 10.
    Cover T M, Thomas J A (2012) Elements of information theory John Wiley and SonsGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Yixian Yang
    • 1
    • 2
    • 3
  • Xinxin Niu
    • 1
    • 2
    • 3
  • Lixiang Li
    • 2
    • 3
  • Haipeng Peng
    • 2
    • 3
  • Jingfeng Ren
    • 3
  • Haochun Qi
    • 3
  1. 1.State Key Laboratory of Public Big DataBeijingPeople’s Republic of China
  2. 2.Information Security Center, State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijingPeople’s Republic of China
  3. 3.National Engineering Laboratory for Disaster Backup and RecoveryBeijing University of Posts and TelecommunicationsBeijingPeople’s Republic of China

Personalised recommendations