Skip to main content

ASU Scholarship Showcase

This growing collection consists of scholarly works authored by ASU-affiliated faculty, students and community members, and contains many open access articles. ASU-affiliated authors are encouraged to Share Your Work in the ASU Digital Repository.

A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks over a relatively wide range of consecutive IP addresses, we successfully uncover intrinsic spatiotemporal patterns underlying cyberattacks, where the term “spatio” refers to the IP address space. In particular, we focus on analyzing macroscopic properties of the attack traffic flows and identify two main patterns with distinct spatiotemporal characteristics: deterministic …

Chen, Yu-Zhong, Huang, Zi-Gang, Xu, Shouhuai, et al.
Created Date