Abstract
Big data brings great value as well as a lot of network security problems, which makes the hacker possess more and more attack strategies. This paper precisely describes the static form of hackers, and proposes the best dynamic hackers attack tactics under certain assumptions. When the proportion of the hacker’s resource input is its static probability distribution value, the hacker income reaches maximum. In particular, on the premise of uniform ratio of input and output, if the entropy of hacker reduces 1 bit, the hacker income will be double. Furthermore, this paper studies the optimal combination of hacker attacks and proposes a logarithmic optimal combination attack strategy that the hacker attacks several systems simultaneously. This strategy not only can maximize the hacker’s overall income, but also can maximize the income of each round attack. We find that the input-output ratio of each system will not change at the end of this round attack when hacker adopts the logarithmic optimal combination strategy, and find the growth rate of additional hacker income does not exceed the mutual information between the input-output ratio of the attacked system and the inedge information if an attacker can get some inedge information through other ways. Moreover, there is an optimum attack growth rate of hackers if time-varying attacked system is a stationary stochastic process. We can conclude that, in Big Data era, the more information the hacker gets, the more hacker income.
Similar content being viewed by others
References
Kim H W, Chan H C, Gupta S (2007) Value-based adoption of mobile internet: an empirical investigation. Decis Support Syst 43(1):111–126
Atzori L, Iera A, Morabito G (2010) The internet of things: A survey. Comput Netw 54(15):2787–2805
Demirkan H, Delen D (2013) Leveraging the capabilities of service-oriented decision support systems: Putting analytics and big data in cloud. Decis Support Syst 55(1):412–421
Li H, Yang Y, Luan T, Liang X, Zhou L, Shen X (2015) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data, IEEE Transactions on Dependable and Secure Computing. doi:10.1109/TDSC.2015.2406704
Li H, Liu D, Dai Y, Luan T H (2015) Engineering Searchable Encryption of Mobile Cloud Networks: When QoE Meets QoP. IEEE Wirel Commun 22(4):74–80
Ivan P L P, Candy Q, Wang Q-H (2006) Tang Hackers, Users, Information Security, Workshop on the Economics of Information Security
Applegate S (2011) Cybermilitias and political hackers: Use of irregular forces in cyberwarfare. IEEE Secur Priv 9(5):16–22
McKenzie, Wark, Hackers (2006) Theory. Cult Soc 23(2-3):320–322
Yang Y, Peng H, Li L, Niu X (2016) General Theory of Security and a Study Case in Internet of Things, IEEE Internet of Things Journal, Accept
Cover T M, Thomas J A (2012) Elements of information theory John Wiley and Sons
Acknowledgments
The authors grateful thank the reviewers for their valuable comments. This paper is supported by the National Natural Science Foundation of China (Grant nos. 61472045 and 61573067), the National Key Research and Development Program (Grant nos. 2016YFB0800602 and 2016YFB0800604), the Beijing City Board of Education Science and Technology Key Project (Grant no. KZ201510015015), and the Beijing City Board of Education Science and Technology Project (Grant no. KM201510015009).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yang, Y., Niu, X., Li, L. et al. General Theory of security and a study of hacker’s behavior in big data era. Peer-to-Peer Netw. Appl. 11, 210–219 (2018). https://doi.org/10.1007/s12083-016-0517-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-016-0517-5