Abdallah Ghourabi, Tarek Abbes and Adel Bouhoula Characterization of attacks collected from the deployment of Web service honeypot Security and Communication Networks 7
In this paper, we propose an automatic technique to analyze the data collected from our Web service Honeypot. The proposed approach is based on four machine learning methods: support vector machines, support vector regression, spectral clustering, and k-means clustering. Our main objectives are to analyze the collected data, automatically characterizing the captured attacks and detecting the denial-of-service and novel attacks.
Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf