4.6 Article

Detection and Modeling of Cyber Attacks with Petri Nets

Journal

ENTROPY
Volume 16, Issue 12, Pages 6602-6623

Publisher

MDPI
DOI: 10.3390/e16126602

Keywords

malware; cyber attack; colored Petri net; malware detection; behavioral analysis

Funding

  1. Polish National Centre for Research and Development [PBS1/A3/14/2012]
  2. European Regional Development Fund, the Innovative Economy Operational Programme, under the Intelligent Information System for Global Monitoring, Detection and Threat Identification (INSIGMA) Project [01.01.02-00-062/09]

Ask authors/readers for more resources

The aim of this article is to present an approach to develop and verify a method of formal modeling of cyber threats directed at computer systems. Moreover, the goal is to prove that the method enables one to create models resembling the behavior of malware that support the detection process of selected cyber attacks and facilitate the application of countermeasures. The most common cyber threats targeting end users and terminals are caused by malicious software, called malware. The malware detection process can be performed either by matching their digital signatures or analyzing their behavioral models. As the obfuscation techniques make the malware almost undetectable, the classic signature-based anti-virus tools must be supported with behavioral analysis. The proposed approach to modeling of malware behavior is based on colored Petri nets. This article is addressed to cyber defense researchers, security architects and developers solving up-to-date problems regarding the detection and prevention of advanced persistent threats.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available