Next Article in Journal
The McMillan Theorem for Colored Branching Processes and Dimensions of Random Fractals
Next Article in Special Issue
Entropy-Based Characterization of Internet Background Radiation
Previous Article in Journal
Depth Image Coding Using Entropy-Based Adaptive Measurement Allocation
Previous Article in Special Issue
Improving the Authentication Scheme and Access Control Protocol for VANETs
Article Menu

Export Article

Open AccessArticle
Entropy 2014, 16(12), 6602-6623;

Detection and Modeling of Cyber Attacks with Petri Nets

C4I Systems' Department, Military Communication Institute, ul. Warszawska 22A, 05-130 Zegrze, Poland
Department of Applied Computer Science, AGH University of Science and Technology, al. Mickiewicza 30, 30-059 Krakow, Poland
Author to whom correspondence should be addressed.
Received: 30 October 2014 / Revised: 4 December 2014 / Accepted: 16 December 2014 / Published: 19 December 2014
Full-Text   |   PDF [1300 KB, uploaded 24 February 2015]   |  


The aim of this article is to present an approach to develop and verify a method of formal modeling of cyber threats directed at computer systems. Moreover, the goal is to prove that the method enables one to create models resembling the behavior of malware that support the detection process of selected cyber attacks and facilitate the application of countermeasures. The most common cyber threats targeting end users and terminals are caused by malicious software, called malware. The malware detection process can be performed either by matching their digital signatures or analyzing their behavioral models. As the obfuscation techniques make the malware almost undetectable, the classic signature-based anti-virus tools must be supported with behavioral analysis. The proposed approach to modeling of malware behavior is based on colored Petri nets. This article is addressed to cyber defense researchers, security architects and developers solving up-to-date problems regarding the detection and prevention of advanced persistent threats. View Full-Text
Keywords: malware; cyber attack; colored Petri net; malware detection; behavioral analysis malware; cyber attack; colored Petri net; malware detection; behavioral analysis

Graphical abstract

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Jasiul, B.; Szpyrka, M.; Śliwa, J. Detection and Modeling of Cyber Attacks with Petri Nets. Entropy 2014, 16, 6602-6623.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Entropy EISSN 1099-4300 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top