Statistical Analysis of Network Attacks Based on Passive Traffic Monitoring Through Honeypot
نویسندگان
چکیده
In the domain of network security, many technologies and tools have been used throughout the years to create and test systems of network intrusion detection system and to test the strengthen of computer security system. One of these is the honeypot. A honeypot appears as a normal part of the network but in actual way it is an isolated environment which monitors the malicious activities in a network. The main benefit of the honeypot is to collect the attack data which are not logged and detected by the network intrusion detection system. Nowadays, security system is very important to any organization to protect their data or any information kept in their computer from the intruders to access. Unauthorized user is able to connect to the organization's computers and control it in some form to view or access the files. Many of us know how to use the computer but do not have enough information to secure the computer especially for the system administrators. "A Statistical Analysis of Network Attacks Based on Passive Traffic Monitoring through Honeypot", this is exactly implemented during the course of our research area to get the internal things about honeypots and to collect the attack data. A honeynet based attack data collection framework is designed and presented in this paper. The isolated environment in the form of honeypots is established as a data feed of malicious traffic to statistical analytical algorithms. The distribution and graphical representations of statistical algorithms are presented which help any normal user or system administrators to see the distributions of attack data. The network packet dumps recorded on a honeypot are treated as malicious traffic which is combined with the normal traffic to learn the machine to detect the malicious activities in a network as real time scenarios.
منابع مشابه
Machine Learning based Traffic Classification using Low Level Features and Statistical Analysis
In this paper, Data mining technique is used to present the concept of attack data analysis and traffic classification. Here the system is completely a automated system that contains packet capturing, processing of multiple attack logs, labeling of network traffic based on low level features and applying the classification algorithm to build a traffic classifier which will classify the normal a...
متن کاملPOSTER: Dragging Attackers to Honeypots for Effective Analysis of Cyber Threats
With the rising number of cyber threats in communication networks, there is a demand for attack analysis and the identification of new threats. Honeypots, tools for attack analysis and zero-day exploit discovery, are passive in waiting for an attacker. This paper proposes a novel approach to the effective utilization of honeypots based on cooperation between honeypots and the network in which t...
متن کاملBotnet Detection Through Fine Flow Classification
The prevalence of botnets, which is defined as a group of infected machines, have become the predominant factor among all the internet malicious attacks such as DDoS, Spam, and Click fraud. The number of botnets is steadily increasing, and the characteristic C&C channels have evolved from IRC to HTTP, FTP, and DNS, etc., and from the centralized structure to P2P and Fast Flux Network Services. ...
متن کاملA Dynamic Approach for Honeypot Management
Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...
متن کاملA Dynamic Approach for Honeypot Management
Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...
متن کامل