Unsupervised Classification and Characterization of Honeypot Attacks - Université Toulouse III - Paul Sabatier - Toulouse INP Accéder directement au contenu
Communication Dans Un Congrès Année : 2014

Unsupervised Classification and Characterization of Honeypot Attacks

Résumé

Monitoring communication networks and their traffic is of essential importance for estimating the risk in the Internet, and therefore designing suited protection systems for computer networks. Network and traffic analysis can be done thanks to measurement devices or honeypots. However, analyzing the huge amount of gathered data, and characterizing the anomalies and attacks contained in these traces remain complex and time consuming tasks, done by network and security experts using poorly automatized tools, and are consequently slow and costly. In this paper, we present an unsupervised method for classification and characterization of security related anomalies and attacks occurring in honeypots. This as automatized as possible method does not need any attack signature database, learning phase, or labeled traffic. This corresponds to a major step towards autonomous security systems. This paper also shows how it is possible from anomalies characterization results to infer filtering rules that could serve for automatically configuring network routers, switches or firewalls.
Fichier principal
Vignette du fichier
PID3405981.pdf (2.2 Mo) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01070141 , version 1 (30-09-2014)

Identifiants

  • HAL Id : hal-01070141 , version 1

Citer

Philippe Owezarski. Unsupervised Classification and Characterization of Honeypot Attacks. 10th International Conference on Network and Service Management, Nov 2014, Rio de Janeiro, Brazil. ⟨hal-01070141⟩
105 Consultations
632 Téléchargements

Partager

Gmail Facebook X LinkedIn More