Knowledge Discovery from Honeypot Data for Monitoring Malicious Attacks

被引:0
|
作者
Jin, Huidong [1 ,2 ]
de Vel, Olivier [3 ]
Zhang, Ke [1 ,2 ]
Liu, Nianjun [1 ,2 ]
机构
[1] NICTA Canberra Lab, Locked Bag 8001, Canberra, ACT 2601, Australia
[2] Australian Natl Univ, RSISE, Canberra, ACT 0200, Australia
[3] Def Sci & Technol Org, Command Ctrl Commun & Intelligence Div, Edinburg, SA 5111, Australia
基金
澳大利亚研究理事会;
关键词
Knowledge discovery; outlier detection; density-based cluster visualisation; botnet; honeypot data; Internet security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Owing to the spread of worms and botnets, cyber attacks have significantly increased in volume, coordination and sophistication. Cheap rentable botnet services, e.g., have resulted in sophisticated botnets becoming an effective and popular tool for committing online crime these days. Honeypots, as information system traps, axe monitoring or deflecting malicious attacks on the Internet. To understand the attack patterns generated by botnets by virtue of the analysis of the data collected by honeypots, we propose an approach that integrates a clustering structure visualisation technique with outlier detection techniques. These techniques complement each other and provide end users both a big-picture view and actionable knowledge of high-dimensional data. We introduce KNOF (K-nearest Neighbours Outlier Factor) as the outlier definition technique to reach a trade-off between global and local outlier definitions, i.e., K-th-Nearest Neighbour (KNN) and Local Outlier Factor (LOF) respectively. We propose an algorithm to discover the most significant KNOF outliers. We implement these techniques in our hpdAnalyzer tool. The tool is successfully used to comprehend honeypot data. A series of experiments show that our proposed KNOF technique substantially outperforms LOF and, to a lesser degree, KNN for real-world honeypot data.
引用
收藏
页码:470 / +
页数:2
相关论文
共 50 条
  • [1] Knowledge Discovery in Cyber Attacks Data
    Kalajdziski, Slobodan
    Trivodaliev, Kire
    Stojkoska, Biljana Risteska
    Ivanoska, Ilinka
    Ilievska, Blagorodna
    2018 26TH TELECOMMUNICATIONS FORUM (TELFOR), 2018, : 839 - 842
  • [2] Malicious Data Attacks on the Smart Grid
    Kosut, Oliver
    Jia, Liyan
    Thomas, Robert J.
    Tong, Lang
    IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) : 645 - 658
  • [3] Monitoring and Diagnosing Malicious Attacks with Autonomic Software
    Souza, Vitor E. Silva
    Mylopoulos, John
    CONCEPTUAL MODELING - ER 2009, PROCEEDINGS, 2009, 5829 : 84 - 98
  • [4] Ad-hoc networks: new detection and prevention approach to malicious attacks using Honeypot
    Mondal A.
    Goswami R.T.
    International Journal of Cloud Computing, 2023, 12 (2-4) : 308 - 323
  • [5] Knowledge discovery from data?
    Pazzani, MJ
    IEEE INTELLIGENT SYSTEMS & THEIR APPLICATIONS, 2000, 15 (02): : 10 - 13
  • [6] Knowledge discovery from data?
    Pazzani, Michael J.
    IEEE Intelligent Systems and Their Applications, 2000, 15 (02): : 10 - 13
  • [7] Securing Hardware from Malicious Attacks
    Abdelgawad, Mohamed M.A.
    Azer, Marianne A.
    TechRxiv, 2022,
  • [8] Knowledge discovery from data streams
    Gama, Joao
    Aguilar-Ruiz, Jesus
    Klinkenberg, Ralf
    INTELLIGENT DATA ANALYSIS, 2008, 12 (03) : 251 - 252
  • [10] Knowledge discovery from data streams
    Gama, Joao
    Aguilar-Ruiz, Jesus
    INTELLIGENT DATA ANALYSIS, 2007, 11 (01) : 1 - 2