Classifying malicious activities in Honeynets using entropy and volume-based thresholds
Article first published online: 3 JUL 2012
Copyright © 2012 John Wiley & Sons, Ltd.
Security and Communication Networks
Volume 6, Issue 5, pages 567–583, May 2013
How to Cite
Sqalli, M. H., Firdous, S. N., Salah, K. and Abu-Amara, M. (2013), Classifying malicious activities in Honeynets using entropy and volume-based thresholds. Security Comm. Networks, 6: 567–583. doi: 10.1002/sec.575
- Issue published online: 11 APR 2013
- Article first published online: 3 JUL 2012
- King Abdul Aziz City for Science and Technology. Grant Number: 08-INF101-4
- malicious, entropy;
A Honeynet is a network designed by the Honeynet Project organization to gather information on security threats and attacks. Honeynets are being used by numerous institutions to proactively improve network security by identifying malicious and unauthorized activities in production and private networks. A Honeynet captures a substantial amount of network data and logs. The analysis of these datasets to identify malicious activities is a challenging task. The main aim of the work in this paper is to employ an anomaly detection technique to classify different types of malicious activities present in Honeynet. In particular, we use feature-based and volume-based schemes for Honeynet data classification. A detailed analysis of various traffic features is carried out, and the most appropriate ones for Honeynet traffic are selected. The classification of malicious activities is achieved by applying entropy-based distributions and traffic volume distributions. Entropy-based distributions are used for feature-based parameters, whereas traffic volume distributions are used for volume-based parameters. The behavior of various anomalies or malicious activities is classified using the selected features and their respective threshold values. Finally, we propose a mapping between the various anomalies and their associated behavior, which can be further used to identify similar anomalies in other Honeynet data sets. Copyright © 2012 John Wiley & Sons, Ltd.