Skip to main content

Modeling and Analysis of Cyberspace Threat Sources Based on Vulnerabilities

  • Conference paper
  • First Online:
  • 1235 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1195))

Abstract

With rapid development of network and information technology, countries and individuals are increasingly relying on information networks. Cybersecurity threats are becoming increasingly prominent. In order to fully exploit the great benefits from the development of informatization, we must strengthen the protection of cyberspace security by discovering and understanding the situation of cyberspace threat sources. This paper established a vulnerability-centric multi-dimensional threat source characterization modeling and classification system, carried out the description and discovery on cyberspace threat sources. Based on the community discovery algorithm, this paper performed threat source correlation analysis and real-time tracking, and established a prototype system, built a comprehensive cyberspace threat source data set and formed a cyberspace threat source ecosystem, which proved to be helpful in the research and judgment of various threats in cyberspace, and effective in the predictive and early warning of cybersecurity risks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. 郭莉, 牛温佳, Li, G.: 《网络安全行为分析》专辑前言. 计算机学报 37(1) (2014)

    Google Scholar 

  2. Charniak, E.: Tree-bank grammars. In: Proceedings of the 10th National Conference on Artificial Intelligence (AAAI 1996), pp. 1031–1036 (1996)

    Google Scholar 

  3. Definition of a Security Vulnerability. https://msdn.microsoft.com/en-us/library/cc751383.aspx

  4. 王宏阳. 基于漏洞分析的软件综合检测方法研究. 大连海事大学 (2016)

    Google Scholar 

  5. Financial Industry Cybersecurity Report. https://securityscorecard.com/resources/2016-financial-industry-cybersecurity-research-report

  6. Chaparro, O., Lu, J., Zampetti, F., et al.: Detecting missing information in bug descriptions. In: Joint Meeting on Foundations of Software Engineering, pp. 396–407. ACM (2017)

    Google Scholar 

  7. You, W., Zong, P., Chen, K., et al.: SemFuzz: semantics-based automatic generation of proof-of-concept exploits. In: ACM SIGSAC Conference, pp. 2139–2154. ACM (2017)

    Google Scholar 

  8. Obernosterer, I., Catala, P., Lami, R., et al.: Biochemical characteristics and bacterial community structure of the sea surface microlayer in the South Pacific Ocean. Biogeosciences 5(3), 693–705 (2016)

    Google Scholar 

  9. Fortunato, S., Hric, D.: Community detection in networks: a user guide. Phys. Rep. 659, 1–44 (2016)

    Article  MathSciNet  Google Scholar 

  10. Bandyopadhyay, S., Coyle, E.J.: An energy efficient hierarchical clustering algorithm for wireless sensor networks. In: Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol. 3, pp. 1713–1723. IEEE (2003)

    Google Scholar 

  11. Gómezluna, J., Gonzálezlinares, J.M., Benavides, J.I., et al.: Parallelization of a video segmentation algorithm on CUDA–enabled graphics processing units. In: Euro-Par 2009 Parallel Processing, pp. 924–935. Springer, Heidelberg (2009)

    Google Scholar 

  12. Girvan, M., Newman, M.E.: Community structure in social and biological networks. Proc. Natl. Acad. Sci. U.S.A. 99(12), 7821 (2002)

    Article  MathSciNet  Google Scholar 

  13. Newman, M.E.J.: Fast algorithm for detecting community structure in networks. Phys. Rev. E Stat. Nonlinear Soft Matter Phys. 69(6 Pt 2), 066133 (2004)

    Google Scholar 

  14. Kernighan, B.W., Lin, S.: A efficient heuristic procedure for partitioning graphs. Bell Syst. Tech. J. 49(2), 292–307 (1970)

    Article  Google Scholar 

  15. Pothen, A., Simon, H.D., Liou, K.P.: Partitioning sparse matrices with eigenvectors of graphs. SIAM J. Matrix Anal. Appl. 11(3), 430–452 (1990)

    Article  MathSciNet  Google Scholar 

  16. Palla, G., Derényi, I., Farkas, I., et al.: Uncovering the overlapping community structure of complex networks in nature and society. Nature 435(7043), 814–818 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yijia Guo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Guo, Y., Hou, Y., Hao, Y., Xu, W. (2021). Modeling and Analysis of Cyberspace Threat Sources Based on Vulnerabilities. In: Barolli, L., Poniszewska-Maranda, A., Park, H. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2020. Advances in Intelligent Systems and Computing, vol 1195. Springer, Cham. https://doi.org/10.1007/978-3-030-50399-4_28

Download citation

Publish with us

Policies and ethics