Sciweavers

526 search results - page 3 / 106
» Increase honeypot security through data analysis
Sort
View
138
Voted
AINA
2010
IEEE
15 years 7 months ago
Empirical Analysis of Attackers Activity on Multi-tier Web Systems
—Web-based systems commonly face unique set of vulnerabilities and security threats due to their high exposure, access by browsers, and integration with databases. In this paper ...
Katerina Goseva-Popstojanova, Brandon Miller, Rist...
117
Voted
DIMVA
2007
15 years 5 months ago
Characterizing Dark DNS Behavior
Security researchers and network operators increasingly rely on information gathered from honeypots and sensors deployed on darknets, or unused address space, for attack detection....
Jon Oberheide, Manish Karir, Zhuoqing Morley Mao
163
Voted
ICICS
2009
Springer
15 years 10 months ago
Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence
We propose a novel approach for statistical risk modeling of network attacks that lets an operator perform risk analysis using a data model and an impact model on top of an attack ...
Tomas Olsson
110
Voted
IEEEARES
2010
IEEE
15 years 9 months ago
Heuristics for Detecting Botnet Coordinated Attacks
— This paper studies the analysis on the Cyber Clean Center (CCC) Data Set 2009, consisting of raw packets captured more than 90 independent honeypots, in order for detecting beh...
Kazuya Kuwabara, Hiroaki Kikuchi, Masato Terada, M...
112
Voted
MASCOTS
2008
15 years 5 months ago
Increased Reliability with SSPiRAL Data Layouts
We evaluate the reliability of storage system schemes consisting of an equal numbers of data disks and parity disks where each parity disk contains the exclusive or (XOR) of two o...
Thomas J. E. Schwarz, Jehan-François P&acir...