[go: up one dir, main page]

Thakar et al., 2005 - Google Patents

Honeyanalyzer–analysis and extraction of intrusion detection patterns & signatures using honeypot

Thakar et al., 2005

View PDF
Document ID
18113555806038386092
Author
Thakar U
Varma S
Ramani A
Publication year
Publication venue
Proceedings of the Second International Conference on Innovations in Information Technology

External Links

Snippet

ABSTRACT A Honeypot is a security resource, which is intended to be attacked and compromised to gain more information about the attacker and his attack techniques. A honeypot can also indicate about how to perform forensics. The information gathered by …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
Booij et al. ToN_IoT: The role of heterogeneity and the need for standardization of features and attack types in IoT network intrusion data sets
Thakar et al. Honeyanalyzer–analysis and extraction of intrusion detection patterns & signatures using honeypot
Wang et al. A graph based approach toward network forensics analysis
Valeur et al. Comprehensive approach to intrusion detection alert correlation
US20160191549A1 (en) Rich metadata-based network security monitoring and analysis
Stergiopoulos et al. Automatic detection of various malicious traffic using side channel features on TCP packets
Mualfah et al. Network forensics for detecting flooding attack on web server
Ali et al. Automated anomaly detector adaptation using adaptive threshold tuning
Ring et al. A toolset for intrusion and insider threat detection
Hnamte et al. An extensive survey on intrusion detection systems: Datasets and challenges for modern scenario
Venturi et al. Practical evaluation of graph neural networks in network intrusion detection
Zekrifa Hybrid Intrusion Detection System
Mahfouz et al. Toward a holistic, efficient, stacking ensemble intrusion detection system using a real cloud-based dataset
Dagdee et al. Intrusion attack pattern analysis and signature extraction for web services using honeypots
Gui et al. A Principled Approach for Detecting APTs in Massive Networks via Multi-Stage Causal Analytics
Raheja et al. Rule‐Based Approach for Botnet Behavior Analysis
Thakar et al. Pattern analysis and signature extraction for intrusion attacks on web services
Balan et al. A Machine Learning Approach for Network Traffic Analysis using Random Forest Regression.
CN113596037A (en) APT attack detection method based on event relation directed graph in network full flow
Ersson et al. Botnet detection with event-driven analysis
Felix et al. Framework for Analyzing Intruder Behavior of IoT Cyber Attacks Based on Network Forensics by Deploying Honeypot Technology
Rafique et al. Xminer: Nip the zero day exploits in the bud
US20240380761A1 (en) Machine learning based approach to detect stealthy command and control network communications
Hubballi et al. Event Log Analysis and Correlation: A Digital Forensic Perspective
Singh et al. Intrusion Detection System Based on Real Time Rule Accession and Honeypot