2017
DOI: 10.3390/app7101082
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity and Network Forensics: Analysis of Malicious Traffic towards a Honeynet with Deep Packet Inspection

Abstract: Any network connected to the Internet is subject to cyber attacks. Strong security measures, forensic tools, and investigators contribute together to detect and mitigate those attacks, reducing the damages and enabling reestablishing the network to its normal operation, thus increasing the cybersecurity of the networked environment. This paper addresses the use of a forensic approach with Deep Packet Inspection to detect anomalies in the network traffic. As cyber attacks may occur on any layer of the TCP/IP ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0
4

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 34 publications
(20 citation statements)
references
References 44 publications
0
16
0
4
Order By: Relevance
“…Pimenta Rodrigues et al [38] applied Deep Packet Inspection (DPI) techniques to detect anomalies and evaluate different attacks on network traffic destined for a High Interactivity Honeynet. Based on the collected data and through the ELK Stack, it was possible to generate statistics of users, services, passwords used, and IP address distribution.…”
Section: Visualization Reviewmentioning
confidence: 99%
See 3 more Smart Citations
“…Pimenta Rodrigues et al [38] applied Deep Packet Inspection (DPI) techniques to detect anomalies and evaluate different attacks on network traffic destined for a High Interactivity Honeynet. Based on the collected data and through the ELK Stack, it was possible to generate statistics of users, services, passwords used, and IP address distribution.…”
Section: Visualization Reviewmentioning
confidence: 99%
“…As for the visualization aspect, this work has functions similar to the works of Sijtsma et al [36], Oliveira Júnior et al [37], and Pimenta Rodrigues et al [38] for the set of viewing options. For example, Section 6.9 presents a quick and practical method using visualization tools for identifying social bots by analyzing outliers.…”
Section: Main Contribution Of This Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The possibility of tracing back [ 21 ] the source network addresses of an attacker is an important tool that not only supports anti-DoS measures but can also take a role in network authentication [ 22 ]. Packet inspection is a required basic technique to support and complement learning, filtering, classification and calculations used in the other techniques [ 23 ].…”
Section: The Problem and Related Workmentioning
confidence: 99%