International Conference on Dependable Systems and Networks (DSN'06)
DOI: 10.1109/dsn.2006.9
|View full text |Cite
|
Sign up to set email alerts
|

A Statistical Analysis of Attack Data to Separate Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(16 citation statements)
references
References 2 publications
0
16
0
Order By: Relevance
“…Many studies related to security analysis have been conducted by means of honeypots [1], [2] or well-known public labeled datasets and simulated intrusions [16], [18], [20], [21].…”
Section: Adopted Datasetsmentioning
confidence: 99%
See 1 more Smart Citation
“…Many studies related to security analysis have been conducted by means of honeypots [1], [2] or well-known public labeled datasets and simulated intrusions [16], [18], [20], [21].…”
Section: Adopted Datasetsmentioning
confidence: 99%
“…The analysis of the security alerts generated by the monitors at node-and network -level provides a goldmine of information to detect attacks and to pinpoint potential system misuse [1], [2], [3], [4]. However, comprehensive system monitoring, which guarantees high coverage at detecting suspicious system activities, causes the generation of large volumes of alerts and false positives [5], [6], [3].…”
Section: Introductionmentioning
confidence: 99%
“…In [7] data collected by two high-interaction honeypots were used to analyze malicious attacks to port 445. That work was focused on distinguishing among three types of attacks using the Kmeans clustering algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…In [20] the data control and data capture is much more distributed. Findings and analysis of the results derived from the honeynet deployment have been detailed in a few papers by Cukier and his team, including: [20] in which it was observed that (using their definitions of port scan, vulnerability scan and attack) port scans should not be considered as precursors to attacks; [21] in which the authors provide empirical and statistical analysis of classifying attacks directed to Windows port 445 (which Short Message Block (SMB) protocol uses), concluding that a criterion as simple as the total number of bytes per connection is very good for separating different attacks on this port, whereas number of packets per connection and connection duration are not so good; or [22] in which the authors analyzed the attacker behavior that follows a successful compromise on Secure Shell (SSH) protocol.…”
Section: Related Workmentioning
confidence: 99%