This chapter studies the activities of cyber attackers on a large scale honeypot run-ning for more than 2 years. A honeypot is a set of online computers that welcome attackers and let them perform their attacks. The chapter presents how to classify complex distributed sessions of attacks. The first part of this chapter analyzes the illegal activities performed by attackers using the data collected during two years of attacks: logged sessions, intrusion detection system alerts, mandatory access control system alerts. The study of these illegal activities allows to understand the global motivations of the cyber attackers, their technical skills and the geographical location of the attackers and their targets. The second part of this chapter p...
The financial and national security impacts of cybercrime globally are well documented. According to...
International audienceThe increase of various malicious activities spreading on the Internet network...
Abstract. This paper presents the lessons learned from an empirical analysis of attackers behaviours...
35 pagesThis chapter studies the activities of cyber attackers on a large scale honeypot running for...
35 pagesThis chapter studies the activities of cyber attackers on a large scale honeypot running for...
35 pagesThis chapter studies the activities of cyber attackers on a large scale honeypot running for...
35 pagesThis chapter studies the activities of cyber attackers on a large scale honeypot running for...
The role of the Internet is continuously increasing and many technical, commercial, and business tra...
Honeypots are computers specifically deployed to be a resource that is expected to be attacked or co...
Very little is known about the exact actions executed by a hacker entering a system. Much insight ca...
Malware in the form of computer viruses, worms, trojan horses, rootkits, and spyware acts as a major...
The security of their network remains the priorities of almost all companies. Existing security syst...
Honeypots are computer systems deliberately designed to be attack targets, mainly to learn about cyb...
International audienceThis paper presents the lessons learned from an empirical analysis of attacker...
The financial and national security impacts of cybercrime globally are well documented. According to...
The financial and national security impacts of cybercrime globally are well documented. According to...
International audienceThe increase of various malicious activities spreading on the Internet network...
Abstract. This paper presents the lessons learned from an empirical analysis of attackers behaviours...
35 pagesThis chapter studies the activities of cyber attackers on a large scale honeypot running for...
35 pagesThis chapter studies the activities of cyber attackers on a large scale honeypot running for...
35 pagesThis chapter studies the activities of cyber attackers on a large scale honeypot running for...
35 pagesThis chapter studies the activities of cyber attackers on a large scale honeypot running for...
The role of the Internet is continuously increasing and many technical, commercial, and business tra...
Honeypots are computers specifically deployed to be a resource that is expected to be attacked or co...
Very little is known about the exact actions executed by a hacker entering a system. Much insight ca...
Malware in the form of computer viruses, worms, trojan horses, rootkits, and spyware acts as a major...
The security of their network remains the priorities of almost all companies. Existing security syst...
Honeypots are computer systems deliberately designed to be attack targets, mainly to learn about cyb...
International audienceThis paper presents the lessons learned from an empirical analysis of attacker...
The financial and national security impacts of cybercrime globally are well documented. According to...
The financial and national security impacts of cybercrime globally are well documented. According to...
International audienceThe increase of various malicious activities spreading on the Internet network...
Abstract. This paper presents the lessons learned from an empirical analysis of attackers behaviours...