Version 2 2024-06-05, 05:25Version 2 2024-06-05, 05:25
Version 1 2016-03-10, 10:29Version 1 2016-03-10, 10:29
journal contribution
posted on 2024-06-05, 05:25authored byS Yu, G Wang, W Zhou
Cyber attacks are an unfortunate part of society as an increasing amount of critical infrastructure is managed and controlled via the Internet. In order to protect legitimate users, it is critical for us to obtain an accurate and timely understanding of our cyber opponents. However, at the moment we lack effective tools to do this. In this article we summarize the work on modeling malicious activities from various perspectives, discuss the pros and cons of current models, and present promising directions for possible efforts in the near future.