Graph-based Forensic Analysis of Web Honeypot

Authors

  • Hudan Studiawan
  • Supeno Djanali
  • Baskoro Adi Pratomo

DOI:

https://doi.org/10.26636/jtit.2016.2.720

Keywords:

access log, attack type, graph agglomerative clustering, visualization of large graphs

Abstract

Honeypot still plays an important role in network security, especially in analyzing attack type and defining attacker patterns. Previous research has mainly focused on detecting attack pattern while categorization of type has not yet been-comprehensively discussed. Nowadays, the web application is the most common and popular way for users to gather information, but it also invites attackers to assault the system. Therefore, deployment of a web honeypot is important and its forensic analysis is urgently required. In this paper, authors propose attack type analysis from web honeypot log for forensic purposes. Every log is represented as a vertex in a graph. Then a custom agglomerative clustering to categorize attack type based on PHP-IDS rules is deployed. A visualization of large graphs is also provided since the actual logs contain tens of thousands of rows of records. The experimental results show that the proposed model can help forensic investigators examine a web honeypot log more precisely.

Downloads

Download data is not yet available.

Downloads

Published

2016-06-30

Issue

Section

ARTICLES FROM THIS ISSUE

How to Cite

[1]
H. Studiawan, S. Djanali, and B. A. Pratomo, “Graph-based Forensic Analysis of Web Honeypot”, JTIT, vol. 64, no. 2, pp. 60–65, Jun. 2016, doi: 10.26636/jtit.2016.2.720.