An evaluation of connection characteristics for separating network attacks
Title | An evaluation of connection characteristics for separating network attacks |
Publication Type | Journal Articles |
Year of Publication | 2009 |
Authors | Berthier R, Cukier M |
Journal | International Journal of Security and Networks |
Volume | 4 |
Issue | 1 |
Pagination | 110 - 124 |
Date Published | 2009/01/01/ |
Abstract | The goal of this paper is to evaluate the efficiency of connection characteristics to separate different attack families that target a single TCP port. Identifying the most relevant characteristics might allow statistically separating attack families without systematically using forensics. This study is based on a dataset collected over 117 days using a test-bed of two high interaction honeypots. The results indicated that to separate unsuccessful from successful attacks in malicious traffic: the number of bytes is a relevant characteristic; time-based characteristics are poor characteristics; using combinations of characteristics does not improve the efficiency of separating attacks. |
URL | http://dx.doi.org/10.1504/IJSN.2009.02343 |
DOI | 10.1504/IJSN.2009.02343 |