2010 24th IEEE International Conference on Advanced Information Networking and Applications 2010
DOI: 10.1109/aina.2010.138
|View full text |Cite
|
Sign up to set email alerts
|

Empirical Analysis of Attackers Activity on Multi-tier Web Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
25
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(25 citation statements)
references
References 12 publications
0
25
0
Order By: Relevance
“…Facing the lack of publicly available, recent data on malicious attacker activities, we developed and deployed highinteraction honeypots as a means to collect such data [10], [11]. These honeypots ran off-the shelf operating systems and applications that followed typical security guidelines and did not include user accounts with nil or weak passwords.…”
Section: Data Collection and Extractionmentioning
confidence: 99%
See 4 more Smart Citations
“…Facing the lack of publicly available, recent data on malicious attacker activities, we developed and deployed highinteraction honeypots as a means to collect such data [10], [11]. These honeypots ran off-the shelf operating systems and applications that followed typical security guidelines and did not include user accounts with nil or weak passwords.…”
Section: Data Collection and Extractionmentioning
confidence: 99%
“…Instead of phpMyAdmin, two Web 2.0 applications were installed: the most widely used wiki software MediaWiki (version 1.9.0), which is used as an application base for Wikipedia, and the most downloaded open source blogging software Wordpress (version 2.1.1). From the honeypot with this configuration, we collected two data sets: Web sessions, each defined as a sequence of requests from the same source IP address to port 80, with a time between two successive request not exceeding a threshold of thirty minutes [10], [11], were extracted automatically from the logs of the front-end Web servers (i.e., Apache and ISS). Since honeypots could not be accessed directly by human users because of the 'transparent linking' approach used for advertising, the only non-malicious sessions in the logs consisted of system management traffic generated by our team and legitimate Web crawlers such as Google and MSNbot.…”
Section: Data Collection and Extractionmentioning
confidence: 99%
See 3 more Smart Citations