Skip to main content
Top
Published in:
Cover of the book

2019 | OriginalPaper | Chapter

1. Introduction

Authors : Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou

Published in: Malicious Attack Propagation and Source Identification

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the remarkable advances in computer technologies, our social, financial and professional existences become increasingly digitized, and governments, healthcare and military infrastructures rely more on computer technologies.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
6.
go back to reference K. Alintanahin. Cryptolocker: Its spam and zeus/zbot connection, October 21 2013. K. Alintanahin. Cryptolocker: Its spam and zeus/zbot connection, October 21 2013.
11.
go back to reference N. Antulov-Fantulin, A. Lančić, T. Šmuc, H. Štefančić, and M. Šikić. Identification of patient zero in static and temporal networks: Robustness and limitations. Physical review letters, 114(24):248701, 2015. N. Antulov-Fantulin, A. Lančić, T. Šmuc, H. Štefančić, and M. Šikić. Identification of patient zero in static and temporal networks: Robustness and limitations. Physical review letters, 114(24):248701, 2015.
22.
go back to reference Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu. Design and analysis of a social botnet. Computer Networks, 57(2):556–578, 2013.CrossRef Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu. Design and analysis of a social botnet. Computer Networks, 57(2):556–578, 2013.CrossRef
23.
go back to reference A. Braunstein and A. Ingrosso. Inference of causality in epidemics on temporal contact networks. Scientific reports, 6:27538, 2016.CrossRef A. Braunstein and A. Ingrosso. Inference of causality in epidemics on temporal contact networks. Scientific reports, 6:27538, 2016.CrossRef
24.
go back to reference D. Brockmann and D. Helbing. The hidden geometry of complex, network-driven contagion phenomena. Science, 342(6164):1337–1342, 2013.CrossRef D. Brockmann and D. Helbing. The hidden geometry of complex, network-driven contagion phenomena. Science, 342(6164):1337–1342, 2013.CrossRef
27.
go back to reference C. Cattuto, W. Van den Broeck, A. Barrat, V. Colizza, J.-F. Pinton, and A. Vespignani. Dynamics of person-to-person interactions from distributed rfid sensor networks. PloS one, 5(7):e11596, 2010.CrossRef C. Cattuto, W. Van den Broeck, A. Barrat, V. Colizza, J.-F. Pinton, and A. Vespignani. Dynamics of person-to-person interactions from distributed rfid sensor networks. PloS one, 5(7):e11596, 2010.CrossRef
42.
go back to reference B. Doerr, M. Fouz, and T. Friedrich. Why rumors spread so quickly in social networks. Commun. ACM, 55(6):70–75, June 2012.CrossRef B. Doerr, M. Fouz, and T. Friedrich. Why rumors spread so quickly in social networks. Commun. ACM, 55(6):70–75, June 2012.CrossRef
50.
go back to reference C. Economics. Malware report: The economic impact of viruses, spyware, adware, botnets, and other malicious code. Irvine, CA: Computer Economics, 2007. C. Economics. Malware report: The economic impact of viruses, spyware, adware, botnets, and other malicious code. Irvine, CA: Computer Economics, 2007.
51.
go back to reference Economist. A thing of threads and patches. Economist, August 25, 2012. Economist. A thing of threads and patches. Economist, August 25, 2012.
54.
55.
go back to reference M. R. Faghani and U. T. Nugyen. Modeling the propagation of trojan malware in online social networks. arXiv preprint arXiv:1708.00969, 2017. M. R. Faghani and U. T. Nugyen. Modeling the propagation of trojan malware in online social networks. arXiv preprint arXiv:1708.00969, 2017.
58.
go back to reference V. Fioriti, M. Chinnici, and J. Palomo. Predicting the sources of an outbreak with a spectral technique. Applied Mathematical Sciences, 8(135):6775–6782, 2014.CrossRef V. Fioriti, M. Chinnici, and J. Palomo. Predicting the sources of an outbreak with a spectral technique. Applied Mathematical Sciences, 8(135):6775–6782, 2014.CrossRef
68.
go back to reference L. Fu, Z. Shen, W.-X. Wang, Y. Fan, and Z. Di. Multi-source localization on complex networks with limited observers. EPL (Europhysics Letters), 113(1):18006, 2016.CrossRef L. Fu, Z. Shen, W.-X. Wang, Y. Fan, and Z. Di. Multi-source localization on complex networks with limited observers. EPL (Europhysics Letters), 113(1):18006, 2016.CrossRef
81.
go back to reference C. S. Institute. The fifteenth annual csi computer crime and security survey. Monroe, WA: Computer Security Institute, 2010. C. S. Institute. The fifteenth annual csi computer crime and security survey. Monroe, WA: Computer Security Institute, 2010.
84.
go back to reference J. Jiang, W. Sheng, S. Yu, Y. Xiang, and W. Zhou. Rumor source identification in social networks with time-varying topology. IEEE Transactions on Dependable and Secure Computing, 2016. J. Jiang, W. Sheng, S. Yu, Y. Xiang, and W. Zhou. Rumor source identification in social networks with time-varying topology. IEEE Transactions on Dependable and Secure Computing, 2016.
85.
go back to reference J. Jiang, S. Wen, S. Yu, Y. Xiang, and W. Zhou. K-center: An approach on the multi-source identification of information diffusion. Information Forensics and Security, IEEE Transactions on, 17 August 2015. J. Jiang, S. Wen, S. Yu, Y. Xiang, and W. Zhou. K-center: An approach on the multi-source identification of information diffusion. Information Forensics and Security, IEEE Transactions on, 17 August 2015.
86.
go back to reference J. Jiang, S. Wen, S. Yu, Y. Xiang, and W. Zhou. K-center: An approach on the multi-source identification of information diffusion. IEEE Transactions on Information Forensics and Security, 10(12):2616–2626, 2015.CrossRef J. Jiang, S. Wen, S. Yu, Y. Xiang, and W. Zhou. K-center: An approach on the multi-source identification of information diffusion. IEEE Transactions on Information Forensics and Security, 10(12):2616–2626, 2015.CrossRef
100.
go back to reference M. J. Krasnow. Hacking, malware, and social engineering—definitions of and statistics about cyber threats contributing to breaches. Expert Commentary: Cyber and Privacy Risk and Insurance, January 2012. M. J. Krasnow. Hacking, malware, and social engineering—definitions of and statistics about cyber threats contributing to breaches. Expert Commentary: Cyber and Privacy Risk and Insurance, January 2012.
103.
go back to reference K. Labs. Facebook malware poses as flash update, infects 110k users, February 2015. K. Labs. Facebook malware poses as flash update, infects 110k users, February 2015.
105.
go back to reference B. Li. An in-depth look into malicious browser extensions, October 2014. B. Li. An in-depth look into malicious browser extensions, October 2014.
119.
go back to reference D. MacRae. 5 viruses to be on the alert for in 2014. D. MacRae. 5 viruses to be on the alert for in 2014.
127.
go back to reference D. Moore, C. Shannon, et al. Code-red: a case study on the spread and victims of an internet worm. In Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, pages 273–284. ACM, 2002. D. Moore, C. Shannon, et al. Code-red: a case study on the spread and victims of an internet worm. In Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, pages 273–284. ACM, 2002.
141.
go back to reference R. A. Pande. Using plant epidemiological methods to track computer network worms. PhD thesis, Virginia Tech, 2004. R. A. Pande. Using plant epidemiological methods to track computer network worms. PhD thesis, Virginia Tech, 2004.
146.
go back to reference P. C. Pinto, P. Thiran, and M. Vetterli. Locating the source of diffusion in large-scale networks. Phys. Rev. Lett., 109, Aug 2012. P. C. Pinto, P. Thiran, and M. Vetterli. Locating the source of diffusion in large-scale networks. Phys. Rev. Lett., 109, Aug 2012.
151.
go back to reference B. Ribeiro, N. Perra, and A. Baronchelli. Quantifying the effect of temporal resolution on time-varying networks. Scientific reports, 3, 2013. B. Ribeiro, N. Perra, and A. Baronchelli. Quantifying the effect of temporal resolution on time-varying networks. Scientific reports, 3, 2013.
156.
go back to reference S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Practical network support for ip traceback. ACM SIGCOMM Computer Communication Review, 30(4):295–306, 2000.CrossRef S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Practical network support for ip traceback. ACM SIGCOMM Computer Communication Review, 30(4):295–306, 2000.CrossRef
157.
go back to reference V. Sekar, Y. Xie, D. A. Maltz, M. K. Reiter, and H. Zhang. Toward a framework for internet forensic analysis. In ACM HotNets-III, 2004. V. Sekar, Y. Xie, D. A. Maltz, M. K. Reiter, and H. Zhang. Toward a framework for internet forensic analysis. In ACM HotNets-III, 2004.
161.
go back to reference D. Shah and T. Zaman. Rumors in a network: Who’s the culprit? IEEE Transactions on information theory, 57(8):5163–5181, 2011.MathSciNetCrossRef D. Shah and T. Zaman. Rumors in a network: Who’s the culprit? IEEE Transactions on information theory, 57(8):5163–5181, 2011.MathSciNetCrossRef
163.
go back to reference Z. Shen, S. Cao, W.-X. Wang, Z. Di, and H. E. Stanley. Locating the source of diffusion in complex networks by time-reversal backward spreading. Physical Review E, 93(3):032301, 2016. Z. Shen, S. Cao, W.-X. Wang, Z. Di, and H. E. Stanley. Locating the source of diffusion in complex networks by time-reversal backward spreading. Physical Review E, 93(3):032301, 2016.
167.
go back to reference Symantec. The 2012 norton cybercrime report. Mountain View, CA: Symantec, 2012. Symantec. The 2012 norton cybercrime report. Mountain View, CA: Symantec, 2012.
169.
go back to reference K. Thomas and D. M. Nicol. The koobface botnet and the rise of social malware. In Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on, pages 63–70. IEEE, 2010. K. Thomas and D. M. Nicol. The koobface botnet and the rise of social malware. In Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on, pages 63–70. IEEE, 2010.
170.
go back to reference M. P. Viana, D. R. Amancio, and L. d. F. Costa. On time-varying collaboration networks. Journal of Informetrics, 7(2):371–378, 2013.CrossRef M. P. Viana, D. R. Amancio, and L. d. F. Costa. On time-varying collaboration networks. Journal of Informetrics, 7(2):371–378, 2013.CrossRef
176.
go back to reference Y. Wang, S. Wen, Y. Xiang, and W. Zhou. Modeling the propagation of worms in networks: A survey. Communications Surveys Tutorials, IEEE, PP(99):1–19, 2013. Y. Wang, S. Wen, Y. Xiang, and W. Zhou. Modeling the propagation of worms in networks: A survey. Communications Surveys Tutorials, IEEE, PP(99):1–19, 2013.
191.
go back to reference Y. Xie, V. Sekar, D. A. Maltz, M. K. Reiter, and H. Zhang. Worm origin identification using random moonwalks. In Security and Privacy, 2005 IEEE Symposium on, pages 242–256. IEEE, 2005. Y. Xie, V. Sekar, D. A. Maltz, M. K. Reiter, and H. Zhang. Worm origin identification using random moonwalks. In Security and Privacy, 2005 IEEE Symposium on, pages 242–256. IEEE, 2005.
198.
go back to reference Y. Zhou and X. Jiang. Dissecting android malware: Characterization and evolution. In Security and Privacy (SP), 2012 IEEE Symposium on, pages 95–109. IEEE, 2012. Y. Zhou and X. Jiang. Dissecting android malware: Characterization and evolution. In Security and Privacy (SP), 2012 IEEE Symposium on, pages 95–109. IEEE, 2012.
200.
go back to reference K. Zhu and L. Ying. Information source detection in the sir model: A sample path based approach. arXiv preprint arXiv:1206.5421, 2012. K. Zhu and L. Ying. Information source detection in the sir model: A sample path based approach. arXiv preprint arXiv:1206.5421, 2012.
202.
go back to reference K. Zhu and L. Ying. A robust information source estimator with sparse observations. Computational Social Networks, 1(1):1, 2014. K. Zhu and L. Ying. A robust information source estimator with sparse observations. Computational Social Networks, 1(1):1, 2014.
206.
go back to reference C. C. Zou, W. Gong, and D. Towsley. Code red worm propagation modeling and analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS ’02, pages 138–147, 2002. C. C. Zou, W. Gong, and D. Towsley. Code red worm propagation modeling and analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS ’02, pages 138–147, 2002.
Metadata
Title
Introduction
Authors
Jiaojiao Jiang
Sheng Wen
Shui Yu
Bo Liu
Yang Xiang
Wanlei Zhou
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-02179-5_1

Premium Partner