DOI: 10.33915/etd.4708
|View full text |Cite
|
Sign up to set email alerts
|

Feature modeling and cluster analysis of malicious Web traffic

Abstract: Feature modeling and cluster analysis of malicious Web traffic by Ana Dimitrijevikj Many attackers find Web applications to be attractive targets since they are widely used and have many vulnerabilities to exploit. The goal of this thesis is to study patterns of attacker activities on typical Web based systems using four data sets collected by honeypots, each in duration of almost four months. The contributions of our work include cluster analysis and modeling the features of the malicious Web traffic. Some of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 37 publications
0
6
0
Order By: Relevance
“…For our previous work [7], [48], [50] and for the work presented here and in [2] a highinteraction honeypots were developed and deployed. These high-interaction honeypots run real services and real Web applications following the example of GenII honeypots used by the Honeynet Project [90].…”
Section: Honeypotmentioning
confidence: 99%
See 3 more Smart Citations
“…For our previous work [7], [48], [50] and for the work presented here and in [2] a highinteraction honeypots were developed and deployed. These high-interaction honeypots run real services and real Web applications following the example of GenII honeypots used by the Honeynet Project [90].…”
Section: Honeypotmentioning
confidence: 99%
“…Since 2008 when our first honeypot system was deployed, we collected huge amounts of data. The data that we analyzed in our previous work [7], [48], [50], and for the work presented here and in [2] was for time periods where honeypots had minimal or no downtime. In total we managed to create four datasets from the observed malicious HTTP traffic from the advertised honeypots.…”
Section: Datasetsmentioning
confidence: 99%
See 2 more Smart Citations
“…The popularity of these applications and their frequent exploitation motivated us to analyze attackers activities on Web systems running Web 2.0 applications. For this purpose, over a period of several years, our research group [18], [55], [48] developed and deployed three high-interaction honeypots, each consisting of a three-tier Web architecture (i.e. Web server, application server, and a database server).…”
Section: Chapter 1 Introductionmentioning
confidence: 99%