IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Identification and Classification of Cyber Threats Through SSH Honeypot Systems

Identification and Classification of Cyber Threats Through SSH Honeypot Systems
View Sample PDF
Author(s): José María Jorquera Valero (Department of Information and Communications Engineering, University of Murcia, Spain), Manuel Gil Pérez (Department of Information and Communications Engineering, University of Murcia, Spain), Alberto Huertas Celdrán (Telecommunications Software and Systems Group, Waterford Institute of Technology, Ireland)and Gregorio Martínez Pérez (Department of Information and Communications Engineering, University of Murcia, Spain)
Copyright: 2020
Pages: 25
Source title: Handbook of Research on Intrusion Detection Systems
Source Author(s)/Editor(s): Brij B. Gupta (National Institute of Technology, Kurukshetra, India)and Srivathsan Srinivasagopalan (AT&T, USA)
DOI: 10.4018/978-1-7998-2242-4.ch006

Purchase

View Identification and Classification of Cyber Threats Through SSH Honeypot Systems on the publisher's website for pricing and purchasing information.

Abstract

As the number and sophistication of cyber threats increases year after year, security systems such as antivirus, firewalls, or Intrusion Detection Systems based on misuse detection techniques are improved in detection capabilities. However, these traditional systems are usually limited to detect potential threats, since they are inadequate to spot zero-day attacks or mutations in behaviour. Authors propose using honeypot systems as a further security layer able to provide an intelligence holistic level in detecting unknown threats, or well-known attacks with new behaviour patterns. Since brute-force attacks are increasing in recent years, authors opted for an SSH medium-interaction honeypot to acquire a log set from attacker's interactions. The proposed system is able to acquire behaviour patterns of each attacker and link them with future sessions for early detection. Authors also generate a feature set to feed Machine Learning algorithms with the main goal of identifying and classifying attacker's sessions, and thus be able to learn malicious intentions in executing cyber threats.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom