Next Article in Journal
The McMillan Theorem for Colored Branching Processes and Dimensions of Random Fractals
Next Article in Special Issue
Entropy-Based Characterization of Internet Background Radiation
Previous Article in Journal
Depth Image Coding Using Entropy-Based Adaptive Measurement Allocation
Previous Article in Special Issue
Improving the Authentication Scheme and Access Control Protocol for VANETs
Article Menu

Export Article

Open AccessArticle
Entropy 2014, 16(12), 6602-6623; doi:10.3390/e16126602

Detection and Modeling of Cyber Attacks with Petri Nets

1
C4I Systems' Department, Military Communication Institute, ul. Warszawska 22A, 05-130 Zegrze, Poland
2
Department of Applied Computer Science, AGH University of Science and Technology, al. Mickiewicza 30, 30-059 Krakow, Poland
*
Author to whom correspondence should be addressed.
Received: 30 October 2014 / Revised: 4 December 2014 / Accepted: 16 December 2014 / Published: 19 December 2014
View Full-Text   |   Download PDF [1300 KB, uploaded 24 February 2015]   |  

Abstract

The aim of this article is to present an approach to develop and verify a method of formal modeling of cyber threats directed at computer systems. Moreover, the goal is to prove that the method enables one to create models resembling the behavior of malware that support the detection process of selected cyber attacks and facilitate the application of countermeasures. The most common cyber threats targeting end users and terminals are caused by malicious software, called malware. The malware detection process can be performed either by matching their digital signatures or analyzing their behavioral models. As the obfuscation techniques make the malware almost undetectable, the classic signature-based anti-virus tools must be supported with behavioral analysis. The proposed approach to modeling of malware behavior is based on colored Petri nets. This article is addressed to cyber defense researchers, security architects and developers solving up-to-date problems regarding the detection and prevention of advanced persistent threats. View Full-Text
Keywords: malware; cyber attack; colored Petri net; malware detection; behavioral analysis malware; cyber attack; colored Petri net; malware detection; behavioral analysis
Figures

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Jasiul, B.; Szpyrka, M.; Śliwa, J. Detection and Modeling of Cyber Attacks with Petri Nets. Entropy 2014, 16, 6602-6623.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Entropy EISSN 1099-4300 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top