首页> 外文会议>IEEE Symposium Series on Computational Intelligence >Data analytics for modeling and visualizing attack behaviors: A case study on SSH brute force attacks
【24h】

Data analytics for modeling and visualizing attack behaviors: A case study on SSH brute force attacks

机译:用于建模和可视化攻击行为的数据分析:SSH蛮力攻击的案例研究

获取原文
获取外文期刊封面目录资料

摘要

In this research, we explore a data analytics based approach for modeling and visualizing attack behaviors. To this end, we employ Self-Organizing Map and Association Rule Mining algorithms to analyze and interpret the behaviors of SSH brute force attacks and SSH normal traffic as a case study. The experimental results based on four different data sets show that the patterns extracted and interpreted from the SSH brute force attack data sets are similar to each other but significantly different from those extracted from the SSH normal traffic data sets. The analysis of the attack traffic provides insight into behavior modeling for brute force SSH attacks. Furthermore, this sheds light into how data analytics could help in modeling and visualizing attack behaviors in general in terms of data acquisition and feature extraction.
机译:在本研究中,我们探讨了基于数据分析的建模和可视化攻击行为方法。为此,我们采用自组织地图和关联规则挖掘算法来分析和解释SSH蛮力攻击和SSH正常流量的行为作为案例研究。基于四个不同的数据集的实验结果表明,从SSH蛮力攻击数据集中提取和解释的模式彼此相似,但与从SSH正常流量数据集中提取的那些显着不同。攻击流量的分析提供了对蛮力SSH攻击的行为建模的洞察。此外,在数据采集和特征提取方面,这揭示了Data Analytics如何有助于建模和可视化攻击行为。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号