Data mining algorithms in the analysis of security logs from a honeypot system

5Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Today many applications move to the Internet as web applications. This phenomenon causes new opportunities for attackers to take over servers or steal sensitive data such as credit card numbers, personal or corporate data. In this paper some analyses of data from a honeypot system of web application, implemented at the Institute of Computer Science, Warsaw University of Technology, are presented. The implemented honeypot has its own management software that helps to analyze the stored data. The honeypot was operating almost one year. Several data mining techniques were used to analyze the data collected by the honeypot and to detect important patterns and attacks. In this paper the results of the usage of algorithms MaxMiner and SED in the analysis of logs are presented.

Author supplied keywords

Cite

CITATION STYLE

APA

Buda, M., & Bluemke, I. (2016). Data mining algorithms in the analysis of security logs from a honeypot system. In Advances in Intelligent Systems and Computing (Vol. 470, pp. 63–73). Springer Verlag. https://doi.org/10.1007/978-3-319-39639-2_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free