1. bookVolume 22 (2022): Edition 2 (June 2022)
Détails du magazine
License
Format
Magazine
eISSN
1314-4081
Première parution
13 Mar 2012
Périodicité
4 fois par an
Langues
Anglais
access type Accès libre

Modelling Activity of a Malicious User in Computer Networks

Publié en ligne: 23 Jun 2022
Volume & Edition: Volume 22 (2022) - Edition 2 (June 2022)
Pages: 86 - 95
Reçu: 17 Nov 2021
Accepté: 31 Mar 2022
Détails du magazine
License
Format
Magazine
eISSN
1314-4081
Première parution
13 Mar 2012
Périodicité
4 fois par an
Langues
Anglais
Abstract

In the present study, an extended classification of Internet users penetrating in computer networks and a definition of the motivation as a psychological and emotional state and main prerequisites for modelling of network intruder’s activity are suggested. A mathematical model as a quadratic function of malicious individual’s behavior and impact on the computer network based on three quantified factors, motivation, satisfaction and system protection is developed. Numerical simulation experiments of the unauthorized access and its effect onto the computer network are carried out. The obtained results are graphically illustrated and discussed.

Keywords

1. Zakaras, M. R. International Computer Crimes. – General Report, Vol. 72, 2001, No 3-4, pp. 813-829. Last access 200021/11/14. https://www.cairn.info/revue-internationale-de-droit-penal-2001-3-page-813.htm10.3917/ridp.723.0813 Search in Google Scholar

2. Brdiczka, O., J. Liu, B. Price, J. Shen. Proactive Insider Threat Detection Through Graph Learning & Psychological Context. Palo Alto Research Centre. http://www.ieee-se-curity.org/TC/SPW2012/proceedings/4740a142.pdf10.1109/SPW.2012.29 Search in Google Scholar

3. Anonymous. The Difference Between Hackers and Crackers. Maximum Security, Indiana: Pearson/Que, 2002. http://www.informit.com/articles/article.aspx?p=30048 Search in Google Scholar

4. Jelen, S. Hacker vs. Cracker. TechRepublic, 14 Oct 2021. https://securitytrails.com/blog/hacker-vs-cracker Search in Google Scholar

5. Passeri, P. Cyber Attack Statistics. Hackmageddon.com, 2014. http://hackmageddon.com/ Search in Google Scholar

6. Chan, S. H. An Empirical Investigation of Hacking Behaviour. – The Review of Business Information Systems, Vol. 9, 2005, No 4, pp. 42-52.10.19030/rbis.v9i4.4443 Search in Google Scholar

7. Weinstein, B. Should You Hire an Ex-Hacker. TechRepublic, 11 June 2002, https://www.techrepublic.com/article/should-you-hire-an-ex-hacker/. Search in Google Scholar

8. Chan, S. H., L. J. Yao. An Exploratory Study on Systems Security and Hacker Hiring. – The Review of Business Information Systems, Vol. 8, 2004, pp. 17-28.10.19030/rbis.v8i4.4473 Search in Google Scholar

9. Lawati, E. A., S. Basha, G. Bhattacharya, J. Hashmi. Mathematical Model and Unitization for the Behaviour of the Intrinsic Recreation Hackers. – International Journal of Innovative Research in Advanced Engineering (IJIRAE), Vol. 1, (2014), No 8. ISSN: 2349-2163. Search in Google Scholar

10. Barber, R. Hackers Profiled – Who Are They and What Are Their Motivations? – Computer Fraud Secur, Vol. 2, 2001, pp. 14-17.10.1016/S1361-3723(01)02017-6 Search in Google Scholar

11. Olson, P. We are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. New York, Back Bay Books, 2013. Search in Google Scholar

12. Bratus, S. What Hackers Learn That the Rest of Us Don’t Notes on Hacker Curriculum? – IEEE Secur. Priv, Vol. 5, 2007, No 4, pp. 72-75.10.1109/MSP.2007.101 Search in Google Scholar

13. Jaquet-Chiffelle, D. O., M. Loi. Ethical and Unethical Hacking, Part of the International Library of Ethics. – Law and Technology Book Series (ELTE), Vol. 21, 2020. https://link.springer.com/chapter/10.1007/978-3-030-29053-5_910.1007/978-3-030-29053-5_9 Search in Google Scholar

14. Australian Government, Australian Institute of Criminology, Australian High-Tech Crime Centre, 2005. https://www.aic.gov.au/sites/default/files/2020-05/htcb005.pdf. Search in Google Scholar

15. Marshall, A. K. Digital Forensics: Digital Evidence in Criminal Investigations. London, Wiley-Blackwell, 2008. https://www.wiley.com/en-us/Digital+Forensics%3A+Digital+Evidence+in+Criminal+Investigations-p-9780470517741 Search in Google Scholar

16. Mohurle, S., Patil, M. A Brief Study of Wannacry Threat: Ransomware Attack. – International Journal Advance Research Computer Science, Udaipur, Vol. 8, 2017, No 5. https://search.proquest.com/docview/1912631307/abstract/DEF9AE2FF2924E35PQ/ Search in Google Scholar

17. Popchev, I., R. Ketipov, V. Angelovа. Risk Averseness and Emotional Stability in e-Comers. – Cybernetics and Information Technologies, Vol. 21, 2021, No 3, pp. 74-84.10.2478/cait-2021-0030 Search in Google Scholar

18. Popchev, I., I. Radeva. A Decision Support Method for Investment Preference Evaluation. – Cybernetics and Information Technologies, Vol. 6, 2006, No 1, pp. 3-16. Search in Google Scholar

19. Popchev, I., D. Orozova. Towards a Multistep Method for Assessment in e-Learning for Emerging Technologies. – Cybernetics and Information Technologies, Vol. 20, 2020, No 3, pp. 116-129.10.2478/cait-2020-0032 Search in Google Scholar

20. Popchev, I., D. Orozova. Towards Big Data Analytics in the e-Learning Space. – Cybernetics and Information Technologies, Vol. 19, 2019, No 3, pp. 16-24.10.2478/cait-2019-0023 Search in Google Scholar

21. Beebe, N., J. Clark. A Model for Predicting Hacker Behaviour. – Published in AMCIS 1, Psychology, Computer Science, 2006. Search in Google Scholar

22. Lahcen, M., R. A. Caulkins, B. Mohapatra et al. Review and Insight on the Behavioural Aspects of Cybersecurity. – Cybersecurity, Vol. 3, 2020, No 10. https://doi.org/10.1186/s42400-020-00050-w10.1186/s42400-020-00050-w Search in Google Scholar

23. Lee, J. R., T. J. Holt. Assessing the Factors Associated with the Detection of Juvenile Hacking Behaviours. – Front. Psychol, 5 May 2020. https://doi.org/10.3389/fpsyg.2020.0084010.3389/fpsyg.2020.00840721471332431647 Search in Google Scholar

24. Dohren, J. Inside the Mind of a Hacker. 2021. https://www.pwc.ch/en/insights/digital/inside-the-mind-of-a-hacker.html Search in Google Scholar

25. Mednikarov, B., Y. Tsonev, A. Lazarov. Analysis of Cybersecurity Issues in the Maritime Industry. – Information & Security: An International Journal, Vol. 47, 2020, No 1, pp. 27-43. ISSN 0861-5160. https://doi.org/10.11610/isij.470210.11610/isij.4702 Search in Google Scholar

Articles recommandés par Trend MD

Planifiez votre conférence à distance avec Sciendo