Nowadays, honeypots are a key tool to attract attackers and study their activity. They help us in the tasks of evaluating attacker's behaviour, discovering new types of attacks, and collecting information and statistics associated with them. However, the gathered data cannot be directly interpreted, but must be analyzed to obtain useful information. In this paper, we present a SSH honeypot-based system designed to simulate a vulnerable server. Thus, we propose an approach for the classification of metrics from the data collected by the honeypot along 19 months
With the amount of network connected devices every increasing, and many of them running the Secure S...
The role of the Internet is continuously increasing and many technical, commercial, and business tra...
International audienceThe CADHo project (Collection and Analysis of Data from Honeypots) is an ongoi...
International audienceMonitoring communication networks and their traffic is of essential importance...
International audienceMonitoring communication networks and their traffic is of essential importance...
This thesis focuses on the topic of honeypots technology and their use for network attacks monitorin...
Very little is known about the exact actions executed by a hacker entering a system. Much insight ca...
Observation, characterization and modeling of attack pro- cesses on the Internet The development of ...
Observation, characterization and modeling of attack pro- cesses on the Internet The development of ...
Honeypots are computer systems deliberately designed to be attack targets, mainly to learn about cyb...
Observation, characterization and modeling of attack pro- cesses on the Internet The development of ...
Observation, characterization and modeling of attack pro- cesses on the Internet The development of ...
In this paper, we propose a honeypot architecture for detecting and analyzing unknown network attack...
International audienceThe CADHo project (Collection and Analysis of Data from Honeypots) is an ongoi...
Abstract—Effective network security administration depends to a great extent on having accurate, con...
With the amount of network connected devices every increasing, and many of them running the Secure S...
The role of the Internet is continuously increasing and many technical, commercial, and business tra...
International audienceThe CADHo project (Collection and Analysis of Data from Honeypots) is an ongoi...
International audienceMonitoring communication networks and their traffic is of essential importance...
International audienceMonitoring communication networks and their traffic is of essential importance...
This thesis focuses on the topic of honeypots technology and their use for network attacks monitorin...
Very little is known about the exact actions executed by a hacker entering a system. Much insight ca...
Observation, characterization and modeling of attack pro- cesses on the Internet The development of ...
Observation, characterization and modeling of attack pro- cesses on the Internet The development of ...
Honeypots are computer systems deliberately designed to be attack targets, mainly to learn about cyb...
Observation, characterization and modeling of attack pro- cesses on the Internet The development of ...
Observation, characterization and modeling of attack pro- cesses on the Internet The development of ...
In this paper, we propose a honeypot architecture for detecting and analyzing unknown network attack...
International audienceThe CADHo project (Collection and Analysis of Data from Honeypots) is an ongoi...
Abstract—Effective network security administration depends to a great extent on having accurate, con...
With the amount of network connected devices every increasing, and many of them running the Secure S...
The role of the Internet is continuously increasing and many technical, commercial, and business tra...
International audienceThe CADHo project (Collection and Analysis of Data from Honeypots) is an ongoi...