首页> 外文会议>IEEE Symposium Series on Computational Intelligence >Data analytics for modeling and visualizing attack behaviors: A case study on SSH brute force attacks
【24h】

Data analytics for modeling and visualizing attack behaviors: A case study on SSH brute force attacks

机译:用于建模和可视化攻击行为的数据分析:SSH暴力攻击案例研究

获取原文

摘要

In this research, we explore a data analytics based approach for modeling and visualizing attack behaviors. To this end, we employ Self-Organizing Map and Association Rule Mining algorithms to analyze and interpret the behaviors of SSH brute force attacks and SSH normal traffic as a case study. The experimental results based on four different data sets show that the patterns extracted and interpreted from the SSH brute force attack data sets are similar to each other but significantly different from those extracted from the SSH normal traffic data sets. The analysis of the attack traffic provides insight into behavior modeling for brute force SSH attacks. Furthermore, this sheds light into how data analytics could help in modeling and visualizing attack behaviors in general in terms of data acquisition and feature extraction.
机译:在这项研究中,我们探索了一种基于数据分析的方法来对攻击行为进行建模和可视化。为此,我们以自组织映射和关联规则挖掘算法为例来分析和解释SSH蛮力攻击和SSH正常流量的行为。基于四个不同数据集的实验结果表明,从SSH暴力攻击数据集提取和解释的模式彼此相似,但与从SSH正常流量数据集提取的模式显着不同。攻击流量的分析使您可以深入了解暴力SSH攻击的行为建模。此外,这为数据分析如何从总体上在数据获取和特征提取方面帮助建模和可视化攻击行为提供了启示。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号