Collection and analysis of attack data based on honeypots deployed on the Internet
نویسندگان
چکیده
منابع مشابه
Empirical analysis and statistical modeling of attack processes based on honeypots
Honeypots are more and more used to collect data on malicious activities on the Internet and to better understand the strategies and techniques used by attackers to compromise target systems. Analysis and modeling methodologies are needed to support the characterization of attack processes based on the data collected from the honeypots. This paper presents some empirical analyses based on the d...
متن کاملData Collection and Data Analysis in Honeypots and Honeynets
Honeypots and honeynets are unconventional security tools to study techniques, methods, tools, and goals of attackers. Therefore, data analysis is an important part of honeypots and honeynets. In paper we focus on analysis of data collected from different honeypots and honeynets. We discuss framework to analyse honeypots’ and honeynets’ data. Also, we outline a secure way to transfer collected ...
متن کاملEmpirical studies based on Honeypots for Characterizing Attackers Behavior
Title of Document: EMPIRICAL STUDIES BASED ON HONEYPOTS FOR CHARACTERIZING ATTACKERS BEHAVIOR Bertrand Sobesto, Doctor of Philosophy, 2015 Directed By: Associate Professor Michel Cukier Reliability Engineering Program The cybersecurity community has made substantial efforts to understand and mitigate security flaws in information systems. Oftentimes when a compromise is discovered, it is diffic...
متن کاملAttack Processes found on the Internet
In this paper, we show that simple, cheap and easily deployable honeypots can help understanding of the attack processes that machines in unclassified networks are facing knowledge is a prerequis several honeypots. We hi diverse locations. Such an open issues described here after. 1.0 INTRODUCTION Recently, several papers have explained how so-called “Internet telescopes” can be use understandi...
متن کاملVulnerability Assessment using Honeypots
Honeypots are electronic bait, i.e. network resources (computers, routers, switches, etc.) deployed to be probed, attacked and compromised. Honeypots run special software which permanently collects data about the system and greatly aids in post-incident computer and network forensics. Several honeypots can be assembled into networks of honeypots called honeynets. Because of the wealth of data c...
متن کامل