首页> 外文期刊>Journal of Universal Computer Science >Analysis of the Infection and the Injection Phases of the Telnet Botnets
【24h】

Analysis of the Infection and the Injection Phases of the Telnet Botnets

机译:对Telnet Botnets的感染和注射阶段分析

获取原文
           

摘要

With the number of Internet of Things devices increasing, also the number of vulnerable devices connected to the Internet increases. These devices can become part of botnets and cause damage to the Internet infrastructure. In this paper we study telnet botnets and their behaviour in the first two stages of its lifecycle - initial infection, and secondary infection. The main objective of this paper is to determine specific attributes of their behavior during these stages and design a model for profiling threat agents into telnet botnets groups. We implemented a telnet honeynet and analyzed collected data. Also, we applied clustering methods for security incident profiling. We consider K-modes and PAM clustering algorithms. We found out that a number of sessions and credential guessing are easily collected and usable attributes for threat agents profiling.
机译:随着物联网的数量增加,也增加了与因特网的易受攻击设备的数量增加。这些设备可以成为僵尸网络的一部分,对互联网基础设施造成损坏。本文在其生命周期 - 初始感染和继发感染的前两个阶段研究Telnet Botnet及其行为。本文的主要目的是在这些阶段确定其行为的特定属性,并将梳理威胁代理的模型设计成Telnet Botnets组。我们实施了Telnet HoneyNet并分析了收集的数据。此外,我们应用了用于安全事件分析的聚类方法。我们考虑K-Modes和PAM集群算法。我们发现,对于威胁代理分析,易于收集和可用属性的许多会话和凭证猜测。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号