Automatic analysis of attack data from distributed honeypot network
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F13%3A86086892" target="_blank" >RIV/61989100:27240/13:86086892 - isvavai.cz</a>
Alternative codes found
RIV/61989100:27740/13:86086892
Result on the web
<a href="http://dx.doi.org/10.1117/12.2015514" target="_blank" >http://dx.doi.org/10.1117/12.2015514</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1117/12.2015514" target="_blank" >10.1117/12.2015514</a>
Alternative languages
Result language
angličtina
Original language name
Automatic analysis of attack data from distributed honeypot network
Original language description
There are many ways of getting real data about malicious activity in a network. One of them relies on masquerading monitoring servers as a production one. These servers are called honeypots and data about attacks on them brings us valuable information about actual attacks and techniques used by hackers. The article describes distributed topology of honeypots, which was developed with a strong orientation on monitoring of IP telephony traffic. IP telephony servers can be easily exposed to various types of attacks, and without protection, this situation can lead to loss of money and other unpleasant consequences. Using a distributed topology with honeypots placed in different geological locations and networks provides more valuable and independent results. With automatic system of gathering information from all honeypots, it is possible to work with all information on one centralized point. Communication between honeypots and centralized data store use secure SSH tunnels and server commu
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
JC - Computer hardware and software
OECD FORD branch
—
Result continuities
Project
<a href="/en/project/ED1.1.00%2F02.0070" target="_blank" >ED1.1.00/02.0070: IT4Innovations Centre of Excellence</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Others
Publication year
2013
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
Proceedings of SPIE - The International Society for Optical Engineering. Volume 8755
ISBN
978-0-8194-9546-4
ISSN
0277-786X
e-ISSN
—
Number of pages
7
Pages from-to
875512, 1-7
Publisher name
SPIE
Place of publication
Bellingham
Event location
Baltimore
Event date
Apr 29, 2013
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
000323598400026