Modeling and analysis of cyberspace threat sources based on vulnerabilities

N/ACitations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With rapid development of network and information technology, countries and individuals are increasingly relying on information networks. Cybersecurity threats are becoming increasingly prominent. In order to fully exploit the great benefits from the development of informatization, we must strengthen the protection of cyberspace security by discovering and understanding the situation of cyberspace threat sources. This paper established a vulnerability-centric multi-dimensional threat source characterization modeling and classification system, carried out the description and discovery on cyberspace threat sources. Based on the community discovery algorithm, this paper performed threat source correlation analysis and real-time tracking, and established a prototype system, built a comprehensive cyberspace threat source data set and formed a cyberspace threat source ecosystem, which proved to be helpful in the research and judgment of various threats in cyberspace, and effective in the predictive and early warning of cybersecurity risks.

Cite

CITATION STYLE

APA

Guo, Y., Hou, Y., Hao, Y., & Xu, W. (2021). Modeling and analysis of cyberspace threat sources based on vulnerabilities. In Advances in Intelligent Systems and Computing (Vol. 1195 AISC, pp. 292–303). Springer. https://doi.org/10.1007/978-3-030-50399-4_28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free