作者: Davide Balzarotti , Davide Canali
DOI:
关键词:
摘要: Web attacks are nowadays one of the major threats on Internet, and several studies have analyzed them, providing details how they performed spread. However, no study seems to sufficiently typical behavior an attacker after a website has been compromised. This paper presents design, implementation, deployment network 500 fully functional honeypot websites, hosting range different services, whose aim is attract attackers collect information what do during their attacks. In 100 days experiments, our system automatically collected, normalized, clustered over 85,000 files that were created approximately 6,000 Labeling clusters allowed us draw general picture attack landscape, identifying behind each action both exploitation web application.