基于一组透明蜜罐的网络空间恶意软件识别

G. Kumar, Sneha Mehta, P. Rajakumar, Gaurav Singh, Ashutosh Chauhan
{"title":"基于一组透明蜜罐的网络空间恶意软件识别","authors":"G. Kumar, Sneha Mehta, P. Rajakumar, Gaurav Singh, Ashutosh Chauhan","doi":"10.1109/ICIPTM57143.2023.10117660","DOIUrl":null,"url":null,"abstract":"The internet is another limitless space where all players, including nations, share data and correspondence innovation, which is currently vital for the cutting edgelifestyle. Since the start of the 21st 100 years, the force of the internet has been a significant wellspring of energy. The role of information in political issues has greatly increased as a result of the proliferation of ICT frameworks in all spheres of society. This capability can be used by both state-sponsored and independent artists to achieve goals online and in the virtual world. The minimal expense and the extraordinary potential effects make the force of the web alluring to all players. Truth be told, online dangers have developed dramatically with the extension of the work environment framework. In this manner, Cyberspace has turned into a landmark equipped for obliterating or delivering futile framework that is normal, unmistakable, mechanical, and reasonable, really subverting significant public abilities. This present circumstance powers generally public foundations to amend their guard procedures, because of the trouble of recognizing players for cyber attacks. It is then important to get a far reaching perspective on the issue to acquire definite, helpful data to recognize those well springs of assault on the web. This new perspective can be accomplished by utilizing the insightful technique created by the creators and applied to the information streams moving through the internet. In this manner we can gather, identify, arrange and dissect the way of behaving of those malevolent projects that act as digital weapons, utilizing a honey bee based program introduced.","PeriodicalId":178817,"journal":{"name":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Malware Identification using a set of Transparent Honeypot in Cyberspace\",\"authors\":\"G. Kumar, Sneha Mehta, P. Rajakumar, Gaurav Singh, Ashutosh Chauhan\",\"doi\":\"10.1109/ICIPTM57143.2023.10117660\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The internet is another limitless space where all players, including nations, share data and correspondence innovation, which is currently vital for the cutting edgelifestyle. Since the start of the 21st 100 years, the force of the internet has been a significant wellspring of energy. The role of information in political issues has greatly increased as a result of the proliferation of ICT frameworks in all spheres of society. This capability can be used by both state-sponsored and independent artists to achieve goals online and in the virtual world. The minimal expense and the extraordinary potential effects make the force of the web alluring to all players. Truth be told, online dangers have developed dramatically with the extension of the work environment framework. In this manner, Cyberspace has turned into a landmark equipped for obliterating or delivering futile framework that is normal, unmistakable, mechanical, and reasonable, really subverting significant public abilities. This present circumstance powers generally public foundations to amend their guard procedures, because of the trouble of recognizing players for cyber attacks. It is then important to get a far reaching perspective on the issue to acquire definite, helpful data to recognize those well springs of assault on the web. This new perspective can be accomplished by utilizing the insightful technique created by the creators and applied to the information streams moving through the internet. In this manner we can gather, identify, arrange and dissect the way of behaving of those malevolent projects that act as digital weapons, utilizing a honey bee based program introduced.\",\"PeriodicalId\":178817,\"journal\":{\"name\":\"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"volume\":\"73 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIPTM57143.2023.10117660\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIPTM57143.2023.10117660","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

互联网是另一个无限的空间,所有参与者,包括国家,共享数据和通信创新,这对于当前的尖端生活方式至关重要。自21世纪初以来,互联网的力量一直是能量的重要源泉。由于信息和通信技术框架在社会所有领域的扩散,信息在政治问题中的作用大大增加。这种能力可以被国家资助的艺术家和独立艺术家用来实现在线和虚拟世界的目标。最小的成本和非凡的潜在影响使网络的力量吸引了所有玩家。说实话,随着工作环境框架的扩展,网络危险已经急剧发展。就这样,网络空间变成了一个地标,用来抹杀或传递那些正常、准确、机械、合理的无用框架,真正颠覆了重要的公共能力。由于难以识别网络攻击的参与者,目前的情况促使一般公共基金会修改其防范程序。因此,重要的是要从长远的角度来看待这个问题,获得明确的、有用的数据,以识别网络攻击的源头。这种新的视角可以通过利用创造者创造的有洞察力的技术来实现,并应用于通过互联网移动的信息流。通过这种方式,我们可以收集、识别、整理和剖析那些作为数字武器的恶意项目的行为方式,利用一个基于蜜蜂的程序。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Malware Identification using a set of Transparent Honeypot in Cyberspace
The internet is another limitless space where all players, including nations, share data and correspondence innovation, which is currently vital for the cutting edgelifestyle. Since the start of the 21st 100 years, the force of the internet has been a significant wellspring of energy. The role of information in political issues has greatly increased as a result of the proliferation of ICT frameworks in all spheres of society. This capability can be used by both state-sponsored and independent artists to achieve goals online and in the virtual world. The minimal expense and the extraordinary potential effects make the force of the web alluring to all players. Truth be told, online dangers have developed dramatically with the extension of the work environment framework. In this manner, Cyberspace has turned into a landmark equipped for obliterating or delivering futile framework that is normal, unmistakable, mechanical, and reasonable, really subverting significant public abilities. This present circumstance powers generally public foundations to amend their guard procedures, because of the trouble of recognizing players for cyber attacks. It is then important to get a far reaching perspective on the issue to acquire definite, helpful data to recognize those well springs of assault on the web. This new perspective can be accomplished by utilizing the insightful technique created by the creators and applied to the information streams moving through the internet. In this manner we can gather, identify, arrange and dissect the way of behaving of those malevolent projects that act as digital weapons, utilizing a honey bee based program introduced.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信