E-mail

E-mail a Wiley Online Library Link

Abdallah Ghourabi, Tarek Abbes and Adel Bouhoula Characterization of attacks collected from the deployment of Web service honeypot Security and Communication Networks 7

Version of Record online: 26 FEB 2013 | DOI: 10.1002/sec.737

Thumbnail image of graphical abstract

In this paper, we propose an automatic technique to analyze the data collected from our Web service Honeypot. The proposed approach is based on four machine learning methods: support vector machines, support vector regression, spectral clustering, and k-means clustering. Our main objectives are to analyze the collected data, automatically characterizing the captured attacks and detecting the denial-of-service and novel attacks.

Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf

Required = Required Field

SEARCH