Big data brings great value as well as a lot of network security problems, which makes the hacker possess more and more attack strategies. This paper precisely describes the static form of hackers, and proposes the best dynamic hackers attack tactics under certain assumptions. When the proportion of the hacker’s resource input is its static probability distribution value, the hacker income reaches maximum. In particular, on the premise of uniform ratio of input and output, if the entropy of hacker reduces 1 bit, the hacker income will be double. Furthermore, this paper studies the optimal combination of hacker attacks and proposes a logarithmic optimal combination attack strategy that the hacker attacks several systems simultaneously. This strategy not only can maximize the hacker’s overall income, but also can maximize the income of each round attack. We find that the input-output ratio of each system will not change at the end of this round attack when hacker adopts the logarithmic optimal combination strategy, and find the growth rate of additional hacker income does not exceed the mutual information between the input-output ratio of the attacked system and the inedge information if an attacker can get some inedge information through other ways. Moreover, there is an optimum attack growth rate of hackers if time-varying attacked system is a stationary stochastic process. We can conclude that, in Big Data era, the more information the hacker gets, the more hacker income.
[1]
Yi Yang,et al.
Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data
,
2016,
IEEE Transactions on Dependable and Secure Computing.
[2]
Sumeet Gupta,et al.
Value-based Adoption of Mobile Internet: An empirical investigation
,
2007,
Decis. Support Syst..
[3]
Scott D. Applegate.
Cybermilitias and Political Hackers: Use of Irregular Forces in Cyberwarfare
,
2011,
IEEE Security & Privacy.
[4]
Qiu-Hong Wang,et al.
Hackers, Users, Information Security
,
2006,
WEIS.
[5]
Thomas M. Cover,et al.
Elements of Information Theory
,
2005
.
[6]
Antonio Iera,et al.
The Internet of Things: A survey
,
2010,
Comput. Networks.
[7]
Dursun Delen,et al.
Leveraging the capabilities of service-oriented decision support systems: Putting analytics and big data in cloud
,
2013,
Decis. Support Syst..
[8]
Lixiang Li,et al.
General Theory of Security and a Study Case in Internet of Things
,
2017,
IEEE Internet of Things Journal.
[9]
Hongwei Li,et al.
Engineering searchable encryption of mobile cloud networks: when QoE meets QoP
,
2015,
IEEE Wireless Communications.