Graph-based Forensic Analysis of Web Honeypot
DOI:
https://doi.org/10.26636/jtit.2016.2.720Keywords:
access log, attack type, graph agglomerative clustering, visualization of large graphsAbstract
Honeypot still plays an important role in network security, especially in analyzing attack type and defining attacker patterns. Previous research has mainly focused on detecting attack pattern while categorization of type has not yet been-comprehensively discussed. Nowadays, the web application is the most common and popular way for users to gather information, but it also invites attackers to assault the system. Therefore, deployment of a web honeypot is important and its forensic analysis is urgently required. In this paper, authors propose attack type analysis from web honeypot log for forensic purposes. Every log is represented as a vertex in a graph. Then a custom agglomerative clustering to categorize attack type based on PHP-IDS rules is deployed. A visualization of large graphs is also provided since the actual logs contain tens of thousands of rows of records. The experimental results show that the proposed model can help forensic investigators examine a web honeypot log more precisely.
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2016 Journal of Telecommunications and Information Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.