Hybrid H-DOC: A bait for analyzing cyber attacker behavior
نویسندگان
چکیده
Cyber security is a vital concern for companies with internet-based cloud networks. These networks are constantly vulnerable to attack, whether from inside or outside organization. Due the ever-changing nature of cyber world, solutions must be updated regularly in order keep infrastructure secure. With use attack detection approaches, systems such as antivirus, firewalls, intrusion have become more effective. However, conventional unable detect zero-day attacks behavioral changes. drawbacks can overcome by setting up honeypot. In this paper, hybrid Honeynet model deployed Docker (H-DOC) bait has been proposed that comprises both low interaction and high honeypot attract malicious attacker analyze patterns. This form bait, designed block attacks, divert an attacker's attention away legitimate services. It focuses only on SSH protocol, it widely used remote system access popular target attacks. The Hybrid H-DOC method identify ransomware activity, trends, timely decision-making through effective rule tunes firewall. accuracy when compared IDH, Decepti-SCADA, AS-IDS HDCM 13.97%, 11.82%, 8.60% 5.07% respectively.
منابع مشابه
H-BwoaSvm: A Hybrid Model for Classification and Feature Selection of Mammography Screening Behavior Data
Breast cancer is one of the most common cancer in the world. Early detection of cancers cause significantly reduce in morbidity rate and treatment costs. Mammography is a known effective diagnosis method of breast cancer. A way for mammography screening behavior identification is women's awareness evaluation for participating in mammography screening programs. Todays, intelligence systems could...
متن کاملUsing Case-Based Reasoning for Cyber Attacker Profiling
Computer security would arguably benefit from more information on the characteristics of the particular human attacker behind a security incident. Nevertheless, technical security mechanisms have always focused on the attack's characteristics rather than the attacker's. The latter is a challenging problem, as relevant data cannot easily be found. We argue that the cyber traces left by a human a...
متن کاملA Statistical Framework for Analyzing Cyber Attacks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Chapter 1: Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Res...
متن کاملAdaptive Attacker Strategy Development Against Moving Target Cyber Defenses
A model of strategy formulation is used to study how an adaptive attacker learns to overcome a moving target cyber defense. The attacker-defender interaction is modeled as a game in which a defender deploys a temporal platform migration defense. Against this defense, a population of attackers develop strategies specifying the temporal ordering of resource investments that bring targeted zero-da...
متن کاملa framework for identifying and prioritizing factors affecting customers’ online shopping behavior in iran
the purpose of this study is identifying effective factors which make customers shop online in iran and investigating the importance of discovered factors in online customers’ decision. in the identifying phase, to discover the factors affecting online shopping behavior of customers in iran, the derived reference model summarizing antecedents of online shopping proposed by change et al. was us...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of electrical and computer engineering systems
سال: 2023
ISSN: ['1847-6996', '1847-7003']
DOI: https://doi.org/10.32985/ijeces.14.1.5