首页> 外文会议>2011 17th IEEE Pacific Rim International Symposium on Dependable Computing >Characterizing Attackers and Attacks: An Empirical Study
【24h】

Characterizing Attackers and Attacks: An Empirical Study

机译:表征攻击者和攻击:一项实证研究

获取原文
获取原文并翻译 | 示例

摘要

This paper describes an empirical research study to characterize attackers and attacks against targets of opportunity. A honey net infrastructure was built and deployed over 167 days that leveraged three different honey pot configurations and a SSH-based authentication proxy to attract and follow attackers over several weeks. A total of 211 attack sessions were recorded and evidence was collected at each stage of the attack sequence: from discovery to intrusion and exploitation of rogue software. This study makes two important contributions: 1) we introduce a new approach to measure attacker skills, and 2) we leverage keystroke profile analysis to differentiate attackers beyond their IP address of origin.
机译:本文描述了一项经验研究,以表征攻击者和针对机会目标的攻击。建立了一个蜜网基础结构,部署了167天,利用三种不同的蜜罐配置和一个基于SSH的身份验证代理在数周内吸引并跟踪攻击者。在攻击序列的每个阶段,总共记录了211次攻击,并收集了证据:从发现到入侵和利用流氓软件。这项研究做出了两个重要贡献:1)我们引入了一种新的方法来衡量攻击者的技能,并且2)我们利用击键配置文件分析来区分攻击者的来源IP地址之外。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号