Selected article for: "analysis dynamic visualization and dynamic visualization"

Author: Cai, Yang; Andre Morales, Jose; Sun, Guoming
Title: Cyber Attribution from Topological Patterns
  • Cord-id: hqw9ohiv
  • Document date: 2020_5_25
  • ID: hqw9ohiv
    Snippet: We developed a crawler to collect live malware distribution network data from publicly available sources including Google Safe Browser and VirusTotal. We then generated a dynamic graph with our visualization tool and performed malware attribution analysis. We found: 1) malware distribution networks form clusters rather than a single network; 2) those cluster sizes follow the Power Law; 3) there is a correlation between cluster size and the number of malware species in the cluster; 4) there is a
    Document: We developed a crawler to collect live malware distribution network data from publicly available sources including Google Safe Browser and VirusTotal. We then generated a dynamic graph with our visualization tool and performed malware attribution analysis. We found: 1) malware distribution networks form clusters rather than a single network; 2) those cluster sizes follow the Power Law; 3) there is a correlation between cluster size and the number of malware species in the cluster; 4) there is a correlation between the number of malware species and cyber events; and finally, 5) infrastructure components such as bridges, hubs, and persistent links play significant roles in malware distribution dynamics.

    Search related documents:
    Co phrase search for related documents
    • Try single phrases listed below for: 1