2011
DOI: 10.1016/j.future.2010.06.004
|View full text |Cite
|
Sign up to set email alerts
|

Honeypot trace forensics: The observation viewpoint matters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…ese days, unpredictable attack detection techniques have drawn attention from the cybersecurity researchers in the field of attack and defence [9]. e defence of the new attack is also one of the original motivations for the active protection of network security [10]. Fu et al [11] combined the conventional APT attack technology and principle and classified the attack into six implementation stages: detection preparation, code incoming, initial intrusion, etc., and summarized the attack characteristics.…”
Section: Related Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…ese days, unpredictable attack detection techniques have drawn attention from the cybersecurity researchers in the field of attack and defence [9]. e defence of the new attack is also one of the original motivations for the active protection of network security [10]. Fu et al [11] combined the conventional APT attack technology and principle and classified the attack into six implementation stages: detection preparation, code incoming, initial intrusion, etc., and summarized the attack characteristics.…”
Section: Related Researchmentioning
confidence: 99%
“…However, it cannot solve the problem of ubiquitous intrusion monitoring identification in edge computing networks. e system services provided by the edge computing terminal and the cloud computing centre still have the possibility of being attacked [6][7][8][9][10][11]. It is still a challenge to conduct intrusion detection with data-driven analytics in the security of edge computing network, which is supported by edge, given the complexity of complex systems and the unique features of edge computing.…”
Section: Introductionmentioning
confidence: 99%
“…They compare the performance of J48, Bayesian network and naïve Bayes classifiers that identified the classification accuracy. Van-Hau et al [51] identified and traced low interaction honeypot belongs to the same botnet without any prior information. He proposed a solution to detect new botnets with very cheap and easily deployable solutions.…”
Section: Botnet Forensic Identificationmentioning
confidence: 99%
“…They were able to identify several types of botnets based on those features. Other authors employed Significant Event Discovery (Buda & Bluemke, 2016), Long-Range Dependency (Zhan & Xu, 2013), Support Vector Machines (Song et al, 2011), Principal Components Analysis (Sharma & Mandeep, 2010;Almotairi, 2009), Symbolic Aggregate Approximation (Thonnard & Dacier, 2008) and feature correlation (Pham & Dacier, 2011). All of them indicate that the forensic examination of honeypot data is executable by standard data mining techniques.…”
Section: Background and Related Workmentioning
confidence: 99%