OU Portal
Log In
Welcome
Applicants
Z6_60GI02O0O8IDC0QEJUJ26TJDI4
Error:
Javascript is disabled in this browser. This page requires Javascript. Modify your browser's settings to allow Javascript to execute. See your browser's documentation for specific instructions.
{}
Close
Publikační činnost
Probíhá načítání, čekejte prosím...
publicationId :
tempRecordId :
actionDispatchIndex :
navigationBranch :
pageMode :
tabSelected :
isRivValid :
Record type:
stať ve sborníku (D)
Home Department:
Katedra informatiky a počítačů (31400)
Title:
Behavioral Analysis of Bot Activity in Infected Systems Using Honeypots
Citace
Zuzčák, M. a Sochor, T. Behavioral Analysis of Bot Activity in Infected Systems Using Honeypots.
In:
Communications in Computer and Information Science 2017-06-20 Lądek Zdrój.
Springer, 2017. s. 118-133. ISBN 978-3-319-59767-6.
Subtitle
Publication year:
2017
Obor:
Number of pages:
16
Page from:
118
Page to:
133
Form of publication:
Elektronická verze
ISBN code:
978-3-319-59767-6
ISSN code:
Proceedings title:
Communications in Computer and Information Science
Proceedings:
Publisher name:
Springer
Place of publishing:
Neuveden
Country of Publication:
Název konference:
Conference venue:
Lądek Zdrój
Datum zahájení konference:
Typ akce podle státní
příslušnosti účastníků:
Celosvětová akce
WoS code:
000425528200010
EID:
2-s2.0-85020450723
Key words in English:
Honeypot medium-interaction, Internet threat, Malware, Trojan, AS, RIR Country of origin, Session duration, Threat detection, Threat dissemination, IPv4
Annotation in original language:
New Internet threats emerge on daily basis and honeypots have become widely used for capturing them in order to investigate their activities. The paper focuses on a detailed analysis of the behavior of various attacks agains 7 Linux-based honeypots. The attacks were analyzed according to the threat type, session duration, AS, country and RIR of the attack origin. Clusters of similar objects were formed accordingly and certain typical attack patterns for potential detection automation as well as some aspects of threat dissemination were identified.
Annotation in english language:
References
Reference
R01:
RIV/61988987:17310/17:A1901WE9
Complementary Content
Deferred Modules
${title}
${badge}
${loading}
Deferred Modules