A Technique for Detecting New Attacks in Low-Interaction Honeypot Traffic

作者: S. Almotairi , A. Clark , G. Mohay , J. Zimmermann

DOI: 10.1109/ICIMP.2009.9

关键词:

摘要: … The honeypot traffic data used in this analysis comes from the Leurré.com project [17]. The Leurré.com project was launched in 2004 for collecting malicious traffic using globally …

参考文章(20)
Khaled Labib, V. Rao Vemuri, An application of principal component analysis to the detection and visualization of computer network attacks Annales Des Télécommunications. ,vol. 61, pp. 218- 234 ,(2006) , 10.1007/BF03219975
Niels Provos, A virtual honeypot framework usenix security symposium. pp. 1- 1 ,(2004)
L. Spitzner, Honeypots: Tracking Hackers ,(2002)
Fabien Pouget, Marc Dacier, Honeypot-based forensics ,(2004)
Olivier Thonnard, George M. Mohay, Saleh I. Almotairi, Corrado Leita, Jacob Zimmermann, Andrew J. Clark, Marc Dacier, Van Hau Pham, Extracting Inter-Arrival Time Based Behaviour From Honeypot Traffic Using Cliques Faculty of Science and Technology; Information Security Institute. pp. 79- 87 ,(2007) , 10.4225/75/57AD42DD7FF2C
Anukool Lakhina, Konstantina Papagiannaki, Mark Crovella, Christophe Diot, Eric D. Kolaczyk, Nina Taft, Structural analysis of network traffic flows Proceedings of the joint international conference on Measurement and modeling of computer systems - SIGMETRICS 2004/PERFORMANCE 2004. ,vol. 32, pp. 61- 72 ,(2004) , 10.1145/1005686.1005697
Christian Kreibich, Jon Crowcroft, Honeycomb: creating intrusion detection signatures using honeypots acm special interest group on data communication. ,vol. 34, pp. 51- 56 ,(2004) , 10.1145/972374.972384
David Moore, Colleen Shannon, Douglas J. Brown, Geoffrey M. Voelker, Stefan Savage, Inferring Internet denial-of-service activity ACM Transactions on Computer Systems. ,vol. 24, pp. 115- 139 ,(2006) , 10.1145/1132026.1132027
Sam T. Roweis, EM Algorithms for PCA and SPCA neural information processing systems. ,vol. 10, pp. 626- 632 ,(1997)
S. Almotairi, A. Clark, G. Mohay, J. Zimmermann, Characterization of Attackers' Activities in Honeypot Traffic Using Principal Component Analysis network and parallel computing. pp. 147- 154 ,(2008) , 10.1109/NPC.2008.82