2008
DOI: 10.1016/j.diin.2008.05.012
|View full text |Cite
|
Sign up to set email alerts
|

A framework for attack patterns' discovery in honeynet data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
36
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 74 publications
(36 citation statements)
references
References 9 publications
0
36
0
Order By: Relevance
“…They were able to identify several types of botnets based on those features. Other authors employed Significant Event Discovery (Buda & Bluemke, 2016), Long-Range Dependency (Zhan & Xu, 2013), Support Vector Machines (Song et al, 2011), Principal Components Analysis (Sharma & Mandeep, 2010;Almotairi, 2009), Symbolic Aggregate Approximation (Thonnard & Dacier, 2008) and feature correlation (Pham & Dacier, 2011). All of them indicate that the forensic examination of honeypot data is executable by standard data mining techniques.…”
Section: Background and Related Workmentioning
confidence: 99%
“…They were able to identify several types of botnets based on those features. Other authors employed Significant Event Discovery (Buda & Bluemke, 2016), Long-Range Dependency (Zhan & Xu, 2013), Support Vector Machines (Song et al, 2011), Principal Components Analysis (Sharma & Mandeep, 2010;Almotairi, 2009), Symbolic Aggregate Approximation (Thonnard & Dacier, 2008) and feature correlation (Pham & Dacier, 2011). All of them indicate that the forensic examination of honeypot data is executable by standard data mining techniques.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The correlation analysis is based on a linear regression models. Thonnard and Dacier proposed a framework for attack patterns' discovery from the honeynet collected data [11]. The aim of this approach is to find, within an attack dataset, groups of network traces sharing various kinds of similar patterns.…”
Section: Related Workmentioning
confidence: 99%
“…The work in [25] focuses on the identification of inter-relationships between these clusters to obtain additional characteristics of the attack tools used, e.g., association of some attack tools with certain geographical locations. Another clustering technique is presented in [26] that analyzes the time series of the network traces and finds groups of traces that are similar in time signatures, thereby identifying various worms and botnets. The authors in [27] proposed a method that integrates clustering structure visualization together with outlier detection, in order to provide a big picture of honeypot data patterns and to detect new botnets as they are deployed.…”
Section: Related Workmentioning
confidence: 99%