Data Mining in Long-Term Honeypot Data

被引:6
|
作者
Fraunholz, Daniel [1 ]
Zimmermann, Marc [1 ]
Hafner, Alexander [1 ]
Schotten, Hans D. [1 ]
机构
[1] German Res Ctr Artificial Intelligence, Intelligent Networks Res Grp, D-67663 Kaiserslautern, Germany
关键词
FRAMEWORK;
D O I
10.1109/ICDMW.2017.92
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Criminal activity in the Internet is becoming more sophisticated. Traditional information security techniques hardly cope with recent trends. Honeypots proved to be a valuable source of threat intelligence. In this work several Honeypots are combined into a Honeynet and observed exploitation attempts. The Honeynet consists of six Honeypots and was operated for 222 days. 12 million exploitation attempts were captured. The captured data is examined and evaluated. Several hypotheses are proposed and analyzed. Dependencies and distribution within the data are identified and quantified. Investigated features are: Temporal and spatial distribution, attacked protocols, involved autonomous systems and the employed dictionaries.
引用
收藏
页码:649 / 656
页数:8
相关论文
共 50 条
  • [1] Data mining: A long-term dream
    Waltz, D
    Hong, SJ
    [J]. IEEE INTELLIGENT SYSTEMS & THEIR APPLICATIONS, 1999, 14 (06): : 30 - 31
  • [2] Data mining: A long-term dream continues
    Waltz, D
    Hong, SJ
    [J]. IEEE INTELLIGENT SYSTEMS & THEIR APPLICATIONS, 2000, 15 (02): : 33 - 33
  • [3] The Application of Data Mining In The Honeypot System
    Li, Zhuoshi
    Jiang, Ranshi
    Li, Jian
    [J]. COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 189 - +
  • [4] Abstraction of long-term changed tests in mining hepatitis data
    Kawasaki, S
    Ho, TB
    Nguyen, DT
    [J]. KNOWLEDGE-BASED INTELLIGNET INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2003, 2774 : 366 - 372
  • [5] Solar image parameter data from the SDO: Long-term curation and data mining
    Schuh, M. A.
    Angryk, R. A.
    Martens, P. C.
    [J]. ASTRONOMY AND COMPUTING, 2015, 13 : 86 - 98
  • [6] Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data
    You, Jianzhou
    Lv, Shichao
    Hao, Yichen
    Feng, Xuan
    Zhou, Ming
    Sun, Limin
    [J]. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 71 - 88
  • [7] Long-term predictors of dengue outbreaks in Bangladesh: A data mining approach
    Muurlink, Olav Titus
    Stephenson, Peter
    Islam, Mohammad Zahirul
    Taylor-Robinson, Andrew W.
    [J]. INFECTIOUS DISEASE MODELLING, 2018, 3 : 322 - 330
  • [8] A data mining approach to support the development of long-term load forecasting
    Maia, M. R.
    Veloso, K. de Oliveira Goncalves
    Okamoto, M. T.
    Rigueira, A. dos Santos
    Tavares, G. M.
    Cister, A. M.
    Zarur, M. A. F.
    de Souza, F. T.
    Terra, G. S.
    Evsukoff, A. G.
    Ebecken, N. F. F.
    [J]. Data Mining VII: Data, Text and Web Mining and Their Business Applications, 2006, 37 : 339 - 348
  • [9] Long-term data archiving
    David S. Moore
    [J]. Analytical and Bioanalytical Chemistry, 2010, 396 : 189 - 192
  • [10] Long-term data on tisagenlecleucel
    Killock, David
    [J]. NATURE REVIEWS CLINICAL ONCOLOGY, 2021, 18 (11) : 676 - 676