Visualisation of Honeypot Data Using Graphviz and Afterglow

نویسنده

  • Craig Valli
چکیده

This research in progress paper explores the use of Graphviz and Afterglow for the analysis of data emanating from a honeypot system. Honeypot systems gather a wide range of data that is often difficult to readily search for patterns and trends using conventional log file analysis techniques. The data from the honeypots has been statically extracted and processed through Afterglow scripts to produce inputs suitable for use by the DOT graph based tools contained within Graphviz. This paper explores some of the benefits and drawbacks of currently using this type of approach.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation

Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...

متن کامل

A Dynamic Approach for Honeypot Management

Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...

متن کامل

Tartarus: A honeypot based malware tracking and mitigation framework

On a daily basis many of the hosts connected to the Internet experience continuous probing and attack from malicious entities. Detection and defence from these malicious entities has primarily been the concern of Intrusion Detection Systems, Intrusion Prevention Systems and Anti-Virus software. These systems rely heavily on known signatures to detect nefarious traffic. Due to the reliance on kn...

متن کامل

Let’s Draw a Graph An Introduction with Graphviz

Graphs are ubiquitous data structures in computer science. Many important problems have solutions hidden in the complexity of modern graphs, rendering effective visualization techniques extremely valuable. The need for such visualization techniques has led to the creation of a myriad of graph drawing algorithms. We present several algorithms to draw several of the most common types of graphs. W...

متن کامل

Growth of CsI(Tl) crystals doped with Ca and Tm and investigation of its scintillation characteristics

In this work, the growth of CsI(Tl) crystals as gamma detector was performed using vertical Bridgman method with Ca and Tm co-dopants. For evaluation of the growth crystals, X-Ray Diffraction (XRD), photoluminescence and thermoluminescence spectra as well as recorded gamma spectra were employed. In addition, the scintillation properties including energy resolution, scintillation decay time, abs...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JDFSL

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2009