Matches in SemOpenAlex for { <https://semopenalex.org/work/W46294098> ?p ?o ?g. }
Showing items 1 to 74 of
74
with 100 items per page.
- W46294098 abstract "Monitoring Internet traffic is critical in order to acquire a good understanding of threats to computer and network security and in designing efficient computer security systems. Researchers and network administrators have applied several approaches to monitoring traffic for malicious content. These techniques include monitoring network components, aggregating IDS alerts, and monitoring unused IP address spaces. Another method for monitoring and analyzing malicious traffic, which has been widely tried and accepted, is the use of honeypots. Honeypots are very valuable security resources for gathering artefacts associated with a variety of Internet attack activities. As honeypots run no production services, any contact with them is considered potentially malicious or suspicious by definition. This unique characteristic of the honeypot reduces the amount of collected traffic and makes it a more valuable source of information than other existing techniques. Currently, there is insufficient research in the honeypot data analysis field. To date, most of the work on honeypots has been devoted to the design of new honeypots or optimizing the current ones. Approaches for analyzing data collected from honeypots, especially low-interaction honeypots, are presently immature, while analysis techniques are manual and focus mainly on identifying existing attacks. This research addresses the need for developing more advanced techniques for analyzing Internet traffic data collected from low-interaction honeypots. We believe that characterizing honeypot traffic will improve the security of networks and, if the honeypot data is handled in time, give early signs of new vulnerabilities or breakouts of new automated malicious codes, such as worms. The outcomes of this research include: • Identification of repeated use of attack tools and attack processes through grouping activities that exhibit similar packet inter-arrival time distributions using the cliquing algorithm; • Application of principal component analysis to detect the structure of attackers’ activities present in low-interaction honeypots and to visualize attackers’ behaviors; • Detection of new attacks in low-interaction honeypot traffic through the use of the principal component’s residual space and the square prediction error statistic; • Real-time detection of new attacks using recursive principal component analysis; • A proof of concept implementation for honeypot traffic analysis and real time monitoring." @default.
- W46294098 created "2016-06-24" @default.
- W46294098 creator A5028614097 @default.
- W46294098 date "2009-01-01" @default.
- W46294098 modified "2023-09-24" @default.
- W46294098 title "Using honeypots to analyse anomalous Internet activities" @default.
- W46294098 cites W1498585374 @default.
- W46294098 cites W1514368868 @default.
- W46294098 cites W1522592232 @default.
- W46294098 cites W1546137167 @default.
- W46294098 cites W1552584884 @default.
- W46294098 cites W1563061804 @default.
- W46294098 cites W1570549471 @default.
- W46294098 cites W1583975142 @default.
- W46294098 cites W1612920240 @default.
- W46294098 cites W1993929036 @default.
- W46294098 cites W2024964356 @default.
- W46294098 cites W2047668894 @default.
- W46294098 cites W2106442760 @default.
- W46294098 cites W2117667893 @default.
- W46294098 cites W2138845856 @default.
- W46294098 cites W2152820192 @default.
- W46294098 cites W2157202423 @default.
- W46294098 cites W2161830378 @default.
- W46294098 cites W2166559705 @default.
- W46294098 cites W3099514962 @default.
- W46294098 cites W3121158818 @default.
- W46294098 cites W341626899 @default.
- W46294098 hasPublicationYear "2009" @default.
- W46294098 type Work @default.
- W46294098 sameAs 46294098 @default.
- W46294098 citedByCount "1" @default.
- W46294098 countsByYear W462940982013 @default.
- W46294098 crossrefType "dissertation" @default.
- W46294098 hasAuthorship W46294098A5028614097 @default.
- W46294098 hasConcept C110875604 @default.
- W46294098 hasConcept C136764020 @default.
- W46294098 hasConcept C182590292 @default.
- W46294098 hasConcept C191267431 @default.
- W46294098 hasConcept C38652104 @default.
- W46294098 hasConcept C41008148 @default.
- W46294098 hasConceptScore W46294098C110875604 @default.
- W46294098 hasConceptScore W46294098C136764020 @default.
- W46294098 hasConceptScore W46294098C182590292 @default.
- W46294098 hasConceptScore W46294098C191267431 @default.
- W46294098 hasConceptScore W46294098C38652104 @default.
- W46294098 hasConceptScore W46294098C41008148 @default.
- W46294098 hasLocation W462940981 @default.
- W46294098 hasOpenAccess W46294098 @default.
- W46294098 hasPrimaryLocation W462940981 @default.
- W46294098 hasRelatedWork W1546208906 @default.
- W46294098 hasRelatedWork W1551093985 @default.
- W46294098 hasRelatedWork W1583731860 @default.
- W46294098 hasRelatedWork W1586604146 @default.
- W46294098 hasRelatedWork W2029502497 @default.
- W46294098 hasRelatedWork W2053566888 @default.
- W46294098 hasRelatedWork W2055159505 @default.
- W46294098 hasRelatedWork W2131321743 @default.
- W46294098 hasRelatedWork W2568120622 @default.
- W46294098 hasRelatedWork W2766474063 @default.
- W46294098 hasRelatedWork W2788248889 @default.
- W46294098 hasRelatedWork W2809169612 @default.
- W46294098 hasRelatedWork W2904972287 @default.
- W46294098 hasRelatedWork W2999276142 @default.
- W46294098 hasRelatedWork W3019758480 @default.
- W46294098 hasRelatedWork W3033628978 @default.
- W46294098 hasRelatedWork W3194761647 @default.
- W46294098 hasRelatedWork W348682933 @default.
- W46294098 hasRelatedWork W82741719 @default.
- W46294098 hasRelatedWork W2187431622 @default.
- W46294098 isParatext "false" @default.
- W46294098 isRetracted "false" @default.
- W46294098 magId "46294098" @default.
- W46294098 workType "dissertation" @default.