Empirical analysis and statistical modeling of attack processes based on honeypots

04/06/2007
by   Mohamed Kaaniche, et al.
0

Honeypots are more and more used to collect data on malicious activities on the Internet and to better understand the strategies and techniques used by attackers to compromise target systems. Analysis and modeling methodologies are needed to support the characterization of attack processes based on the data collected from the honeypots. This paper presents some empirical analyses based on the data collected from the Leurré.com honeypot platforms deployed on the Internet and presents some preliminary modeling studies aimed at fulfilling such objectives.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/03/2019

Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum

We performed the first systematic study of a new attack on Ethereum to s...
research
01/02/2023

Science Platforms for Heliophysics Data Analysis

We recommend that NASA maintain and fund science platforms that enable i...
research
07/28/2016

Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence

In this paper, we present an operational system for cyber threat intelli...
research
08/03/2023

Tool-Supported Architecture-Based Data Flow Analysis for Confidentiality

Through the increasing interconnection between various systems, the need...
research
06/14/2020

Cloud as an Attack Platform

We present an exploratory study of responses from 75 security profession...
research
02/09/2022

Statistical Tools for Imaging Atmospheric Cherenkov Telescopes

The development of Imaging Atmospheric Cherenkov Telescopes (IACTs) unve...
research
05/29/2019

ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks

Despite the fact that cyberattacks are constantly growing in complexity,...

Please sign up or login with your details

Forgot password? Click here to reset