Skip to main content
Log in

General Theory of security and a study of hacker’s behavior in big data era

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Big data brings great value as well as a lot of network security problems, which makes the hacker possess more and more attack strategies. This paper precisely describes the static form of hackers, and proposes the best dynamic hackers attack tactics under certain assumptions. When the proportion of the hacker’s resource input is its static probability distribution value, the hacker income reaches maximum. In particular, on the premise of uniform ratio of input and output, if the entropy of hacker reduces 1 bit, the hacker income will be double. Furthermore, this paper studies the optimal combination of hacker attacks and proposes a logarithmic optimal combination attack strategy that the hacker attacks several systems simultaneously. This strategy not only can maximize the hacker’s overall income, but also can maximize the income of each round attack. We find that the input-output ratio of each system will not change at the end of this round attack when hacker adopts the logarithmic optimal combination strategy, and find the growth rate of additional hacker income does not exceed the mutual information between the input-output ratio of the attacked system and the inedge information if an attacker can get some inedge information through other ways. Moreover, there is an optimum attack growth rate of hackers if time-varying attacked system is a stationary stochastic process. We can conclude that, in Big Data era, the more information the hacker gets, the more hacker income.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Kim H W, Chan H C, Gupta S (2007) Value-based adoption of mobile internet: an empirical investigation. Decis Support Syst 43(1):111–126

    Article  Google Scholar 

  2. Atzori L, Iera A, Morabito G (2010) The internet of things: A survey. Comput Netw 54(15):2787–2805

    Article  MATH  Google Scholar 

  3. Demirkan H, Delen D (2013) Leveraging the capabilities of service-oriented decision support systems: Putting analytics and big data in cloud. Decis Support Syst 55(1):412–421

    Article  Google Scholar 

  4. Li H, Yang Y, Luan T, Liang X, Zhou L, Shen X (2015) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data, IEEE Transactions on Dependable and Secure Computing. doi:10.1109/TDSC.2015.2406704

  5. Li H, Liu D, Dai Y, Luan T H (2015) Engineering Searchable Encryption of Mobile Cloud Networks: When QoE Meets QoP. IEEE Wirel Commun 22(4):74–80

    Article  Google Scholar 

  6. Ivan P L P, Candy Q, Wang Q-H (2006) Tang Hackers, Users, Information Security, Workshop on the Economics of Information Security

  7. Applegate S (2011) Cybermilitias and political hackers: Use of irregular forces in cyberwarfare. IEEE Secur Priv 9(5):16–22

    Article  Google Scholar 

  8. McKenzie, Wark, Hackers (2006) Theory. Cult Soc 23(2-3):320–322

    Article  Google Scholar 

  9. Yang Y, Peng H, Li L, Niu X (2016) General Theory of Security and a Study Case in Internet of Things, IEEE Internet of Things Journal, Accept

  10. Cover T M, Thomas J A (2012) Elements of information theory John Wiley and Sons

Download references

Acknowledgments

The authors grateful thank the reviewers for their valuable comments. This paper is supported by the National Natural Science Foundation of China (Grant nos. 61472045 and 61573067), the National Key Research and Development Program (Grant nos. 2016YFB0800602 and 2016YFB0800604), the Beijing City Board of Education Science and Technology Key Project (Grant no. KZ201510015015), and the Beijing City Board of Education Science and Technology Project (Grant no. KM201510015009).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lixiang Li.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, Y., Niu, X., Li, L. et al. General Theory of security and a study of hacker’s behavior in big data era. Peer-to-Peer Netw. Appl. 11, 210–219 (2018). https://doi.org/10.1007/s12083-016-0517-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-016-0517-5

Keywords

Navigation