The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Identification and Classification of Cyber Threats Through SSH Honeypot Systems
|
Author(s): José María Jorquera Valero (Department of Information and Communications Engineering, University of Murcia, Spain), Manuel Gil Pérez (Department of Information and Communications Engineering, University of Murcia, Spain), Alberto Huertas Celdrán (Telecommunications Software and Systems Group, Waterford Institute of Technology, Ireland)and Gregorio Martínez Pérez (Department of Information and Communications Engineering, University of Murcia, Spain)
Copyright: 2020
Pages: 25
Source title:
Handbook of Research on Intrusion Detection Systems
Source Author(s)/Editor(s): Brij B. Gupta (National Institute of Technology, Kurukshetra, India)and Srivathsan Srinivasagopalan (AT&T, USA)
DOI: 10.4018/978-1-7998-2242-4.ch006
Purchase
|
Abstract
As the number and sophistication of cyber threats increases year after year, security systems such as antivirus, firewalls, or Intrusion Detection Systems based on misuse detection techniques are improved in detection capabilities. However, these traditional systems are usually limited to detect potential threats, since they are inadequate to spot zero-day attacks or mutations in behaviour. Authors propose using honeypot systems as a further security layer able to provide an intelligence holistic level in detecting unknown threats, or well-known attacks with new behaviour patterns. Since brute-force attacks are increasing in recent years, authors opted for an SSH medium-interaction honeypot to acquire a log set from attacker's interactions. The proposed system is able to acquire behaviour patterns of each attacker and link them with future sessions for early detection. Authors also generate a feature set to feed Machine Learning algorithms with the main goal of identifying and classifying attacker's sessions, and thus be able to learn malicious intentions in executing cyber threats.
Related Content
Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini.
© 2024.
14 pages.
|
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim.
© 2024.
30 pages.
|
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan.
© 2024.
19 pages.
|
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi.
© 2024.
14 pages.
|
Meryeme Bououchma, Brahim Herrou.
© 2024.
14 pages.
|
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim.
© 2024.
16 pages.
|
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly.
© 2024.
10 pages.
|
|
|