作者: Robin Berthier , Michel Cukier
关键词:
摘要: The goal of this paper is to evaluate the efficiency connection characteristics separate different attack families that target a single TCP port. Identifying most relevant might allow statistically separating without systematically using forensics. This study based on dataset collected over 117 days test-bed two high interaction honeypots. results indicated unsuccessful from successful attacks in malicious traffic: number bytes characteristic; time-based are poor characteristics; combinations does not improve attacks.