Title :
An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic
Author :
Sqalli, Mohammed H. ; Firdous, Syed Naeem ; Baig, Zubair ; Azzedin, Farag
Author_Institution :
Coll. of Comput. Sci. & Eng., King Fahd Univ. of Pet. & Miner., Dhahran, Saudi Arabia
Abstract :
Honeynets are an increasingly popular choice deployed by organizations to lure attackers into a trap network, for collection and analysis of unauthorized network activity. A Honeynet captures substantial amount of data and logs for analysis in order to identify malicious activities perpetrated by the hacker community. The analysis of this large amount of data is a challenging task. Through this paper, we propose a technique based on the entropy and volume thresholds of selected network features to efficiently analyze Honeynet data, and identify malicious activities. Our technique consists of both feature-based and volume-based schemes to identify malicious activities in the Honeynet traffic. Through deployment of our proposed approach, a detailed analysis of various traffic features is conducted and the most appropriate features for Honeynet traffic are thereupon selected. The anomalies are identified using entropy distributions and volume distributions, along with their corresponding threshold levels. The proposed scheme proves to be effective in identifying most types of anomalies seen in Honeynet traffic.
Keywords :
security of data; cybersecurity; entropy distributions; feature-based schemes; hacker community; honeynet traffic; malicious activity identification; volume-based approach; Educational institutions; Entropy; Feature extraction; IP networks; Organizations; Payloads; Security; Anomaly Detection; Cybersecurity; Entropy; Honeynet;
Conference_Titel :
Cyberworlds (CW), 2011 International Conference on
Conference_Location :
Banff, ON
Print_ISBN :
978-1-4577-1453-5