Using honeypots to analyse anomalous Internet activities

作者: Saleh Ibrahim Bakr Almotairi

DOI:

关键词:

摘要: Monitoring Internet traffic is critical in order to acquire a good understanding of threats computer and network security designing efficient systems. Researchers administrators have applied several approaches monitoring for malicious content. These techniques include components, aggregating IDS alerts, unused IP address spaces. Another method analyzing traffic, which has been widely tried accepted, the use honeypots. Honeypots are very valuable resources gathering artefacts associated with variety attack activities. As honeypots run no production services, any contact them considered potentially or suspicious by definition. This unique characteristic honeypot reduces amount collected makes it more source information than other existing techniques. Currently, there insufficient research data analysis field. To date, most work on devoted design new optimizing current ones. Approaches from honeypots, especially low-interaction presently immature, while manual focus mainly identifying attacks. addresses need developing advanced We believe that characterizing will improve networks and, if handled time, give early signs vulnerabilities breakouts automated codes, such as worms. The outcomes this include: • Identification repeated tools processes through grouping activities exhibit similar packet inter-arrival time distributions using cliquing algorithm; Application principal component detect structure attackers’ present visualize behaviors; Detection attacks component’s residual space square prediction error statistic; Real-time detection recursive analysis; A proof concept implementation real monitoring.

参考文章(22)
Khaled Labib, V. Rao Vemuri, An application of principal component analysis to the detection and visualization of computer network attacks Annales Des Télécommunications. ,vol. 61, pp. 218- 234 ,(2006) , 10.1007/BF03219975
Vern Paxson, Stuart Staniford, Nicholas Weaver, How to Own the Internet in Your Spare Time usenix security symposium. pp. 149- 167 ,(2002)
Niels Provos, A virtual honeypot framework usenix security symposium. pp. 1- 1 ,(2004)
Michael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario, David Watson, None, The Internet Motion Sensor - A Distributed Blackhole Monitoring System. network and distributed system security symposium. ,(2005)
K. Abdullah, C. Lee, G. Conti, J.A. Copeland, J. Stasko, IDS rainStorm: visualizing IDS alarms visualization for computer security. pp. 1- 10 ,(2005) , 10.1109/VIZSEC.2005.8
Geoffrey M. Voelker, Stefan Savage, David Moore, Inferring internet denial-of-service activity usenix security symposium. pp. 2- 2 ,(2001)
Wenke Lee, Salvatore J. Stolfo, Data mining approaches for intrusion detection usenix security symposium. pp. 6- 6 ,(1998) , 10.21236/ADA401496
Fabien Pouget, Marc Dacier, Honeypot-based forensics ,(2004)