2019 International Conference on Computational Science and Computational Intelligence (CSCI) 2019
DOI: 10.1109/csci49370.2019.00035
|View full text |Cite
|
Sign up to set email alerts
|

Review and Analysis of Cowrie Artefacts and Their Potential to be Used Deceptively

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 14 publications
0
14
0
1
Order By: Relevance
“…Furthermore, the GPT-2 small size model is easy to fine-tune and the weight of the model can adapt better to honeypot logs data [16]. Our data contains 36,445 unique commands and was split into training (32,801), validation (3,645) and test (999) sets. We used two epochs and a batch size of two, depending on the maximum sequence length and GPU memory.…”
Section: A Training Datamentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, the GPT-2 small size model is easy to fine-tune and the weight of the model can adapt better to honeypot logs data [16]. Our data contains 36,445 unique commands and was split into training (32,801), validation (3,645) and test (999) sets. We used two epochs and a batch size of two, depending on the maximum sequence length and GPU memory.…”
Section: A Training Datamentioning
confidence: 99%
“…Cowrie is a virtual Secure Shell (SSH) and Telnet honeypot, utilized to continuously monitor brute force attacks, by producing log files capturing the actions of malicious users. However, they can be easily identified by adversaries, since they are rarely customized to systems, due to the lack of standard frameworks [3]. To better understand and leverage the deceptive capabilities of Cowrie, it is important to automate the parsing methodologies of the log files produced.…”
Section: Introductionmentioning
confidence: 99%
“…Beberapa studi telah mengkaji terkait keamanan jaringan menggunakan IPS cowrie honepot dan snort inline-mode. [8] memodifikasi konfigurasi default variabel cowrie untuk meningkatkan kemampuan cowrie, hasil studi memberikan informasi terkait peningkatan kemampuan cowrie. Sementara itu [9] melakukan eksperimen menggunakan program cowrie untuk melindungi port SSH yang terbuka di server infrastruktur jaringan perbankan, hasil percobaan cowrie mampu mengidentifikasi tindakan penyerangan.…”
Section: Pendahuluanunclassified
“…Lowinteraction honeypots normally imitate real systems and have restricted communication with cyberattackers; whereas, high-interaction honeypots are normally real systems that have unrestricted communication with cyberattackers [38]. Medium-interaction honeypots have greater ability to communicate with cyberattackers than low-interaction honeypots, however, they have less functionality than highinteraction honeypots [7]. Honeypots can be a crucial active defence tool for organisations or researchers in an attempt to discover advanced attacks and related techniques which are not possible through other security tools; however, for effective operation, additional cost and skills are required in their design and management.…”
Section: Honeypotsmentioning
confidence: 99%