Abstract
With rapid development of network and information technology, countries and individuals are increasingly relying on information networks. Cybersecurity threats are becoming increasingly prominent. In order to fully exploit the great benefits from the development of informatization, we must strengthen the protection of cyberspace security by discovering and understanding the situation of cyberspace threat sources. This paper established a vulnerability-centric multi-dimensional threat source characterization modeling and classification system, carried out the description and discovery on cyberspace threat sources. Based on the community discovery algorithm, this paper performed threat source correlation analysis and real-time tracking, and established a prototype system, built a comprehensive cyberspace threat source data set and formed a cyberspace threat source ecosystem, which proved to be helpful in the research and judgment of various threats in cyberspace, and effective in the predictive and early warning of cybersecurity risks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
郭莉, 牛温佳, Li, G.: 《网络安全行为分析》专辑前言. 计算机学报 37(1) (2014)
Charniak, E.: Tree-bank grammars. In: Proceedings of the 10th National Conference on Artificial Intelligence (AAAI 1996), pp. 1031–1036 (1996)
Definition of a Security Vulnerability. https://msdn.microsoft.com/en-us/library/cc751383.aspx
王宏阳. 基于漏洞分析的软件综合检测方法研究. 大连海事大学 (2016)
Financial Industry Cybersecurity Report. https://securityscorecard.com/resources/2016-financial-industry-cybersecurity-research-report
Chaparro, O., Lu, J., Zampetti, F., et al.: Detecting missing information in bug descriptions. In: Joint Meeting on Foundations of Software Engineering, pp. 396–407. ACM (2017)
You, W., Zong, P., Chen, K., et al.: SemFuzz: semantics-based automatic generation of proof-of-concept exploits. In: ACM SIGSAC Conference, pp. 2139–2154. ACM (2017)
Obernosterer, I., Catala, P., Lami, R., et al.: Biochemical characteristics and bacterial community structure of the sea surface microlayer in the South Pacific Ocean. Biogeosciences 5(3), 693–705 (2016)
Fortunato, S., Hric, D.: Community detection in networks: a user guide. Phys. Rep. 659, 1–44 (2016)
Bandyopadhyay, S., Coyle, E.J.: An energy efficient hierarchical clustering algorithm for wireless sensor networks. In: Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol. 3, pp. 1713–1723. IEEE (2003)
Gómezluna, J., Gonzálezlinares, J.M., Benavides, J.I., et al.: Parallelization of a video segmentation algorithm on CUDA–enabled graphics processing units. In: Euro-Par 2009 Parallel Processing, pp. 924–935. Springer, Heidelberg (2009)
Girvan, M., Newman, M.E.: Community structure in social and biological networks. Proc. Natl. Acad. Sci. U.S.A. 99(12), 7821 (2002)
Newman, M.E.J.: Fast algorithm for detecting community structure in networks. Phys. Rev. E Stat. Nonlinear Soft Matter Phys. 69(6 Pt 2), 066133 (2004)
Kernighan, B.W., Lin, S.: A efficient heuristic procedure for partitioning graphs. Bell Syst. Tech. J. 49(2), 292–307 (1970)
Pothen, A., Simon, H.D., Liou, K.P.: Partitioning sparse matrices with eigenvectors of graphs. SIAM J. Matrix Anal. Appl. 11(3), 430–452 (1990)
Palla, G., Derényi, I., Farkas, I., et al.: Uncovering the overlapping community structure of complex networks in nature and society. Nature 435(7043), 814–818 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Guo, Y., Hou, Y., Hao, Y., Xu, W. (2021). Modeling and Analysis of Cyberspace Threat Sources Based on Vulnerabilities. In: Barolli, L., Poniszewska-Maranda, A., Park, H. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2020. Advances in Intelligent Systems and Computing, vol 1195. Springer, Cham. https://doi.org/10.1007/978-3-030-50399-4_28
Download citation
DOI: https://doi.org/10.1007/978-3-030-50399-4_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-50398-7
Online ISBN: 978-3-030-50399-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)