Study of attack using honeypots and honeynets lessons learned from time-oriented visualization

作者: Pavol Sokol , Lenka Kleinova , Martin Husak

DOI: 10.1109/EUROCON.2015.7313713

关键词:

摘要: Honeypots and honeynets are unconventional security tools to study techniques, methods, tools, goals of attackers. Analysis data collected by these is important for network security. In this paper, authors focus on time-oriented as well they outline visualization kind in honeypots honeynets. Authors also provide results from honeynet based special - heatmaps.

参考文章(14)
Tomas Sochor, Matej Zuzcak, Study of Internet Threats and Attack Methods Using Honeypots and Honeynets Computer Networks and Isdn Systems. pp. 118- 127 ,(2014) , 10.1007/978-3-319-07941-7_12
Olivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier, Automating the Analysis of Honeypot Data (Extended Abstract) recent advances in intrusion detection. pp. 406- 407 ,(2008) , 10.1007/978-3-540-87403-4_29
Niels Provos, A virtual honeypot framework usenix security symposium. pp. 1- 1 ,(2004)
Shixia Liu, Weiwei Cui, Yingcai Wu, Mengchen Liu, None, A survey on information visualization: recent advances and challenges The Visual Computer. ,vol. 30, pp. 1373- 1393 ,(2014) , 10.1007/S00371-013-0892-3
Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Matthieu Herrb, Set-up and deployment of a high-interaction honeypot: experiment and lessons learned Journal of Computer Virology and Hacking Techniques. ,vol. 7, pp. 143- 157 ,(2011) , 10.1007/S11416-010-0144-2
Rick Hofstede, Pavel Celeda, Brian Trammell, Idilio Drago, Ramin Sadre, Anna Sperotto, Aiko Pras, Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX IEEE Communications Surveys and Tutorials. ,vol. 16, pp. 2037- 2064 ,(2014) , 10.1109/COMST.2014.2321898
Liu Tian-Hua, Yi Xiu-Shuang, Ma Shi-Wei, Core Functions Analysis and Example Deployment of Virtual Honeynet international conference on robot, vision and signal processing. pp. 212- 215 ,(2011) , 10.1109/RVSP.2011.16
Abhishek Mairh, Debabrat Barik, Kanchan Verma, Debasish Jena, Honeypot in network security Proceedings of the 2011 International Conference on Communication, Computing & Security - ICCCS '11. pp. 600- 605 ,(2011) , 10.1145/1947940.1948065
E. Alata, V. Nicomette, M. Kaaniche, M. Dacier, M. Herrb, Lessons learned from the deployment of a high-interaction honeypot european dependable computing conference. pp. 39- 46 ,(2006) , 10.1109/EDCC.2006.17