@inproceedings{d39a3942924d469387718961c4efcae3,
title = "Identifying scanning activities in honeynet data using data mining",
abstract = "Businesses attract different types of attacks mostly due to the financial benefits associated with gaining unauthorized access. As a first step to launching attacks, attackers scan production networks looking for open services and vulnerable software. These scanning or enumeration activities, if monitored properly, can be used as early warning systems against a much sophisticated and dedicated attack. Honey nets are deployed for the purpose of tracking malicious activities and learn about hackers' origin, methods and attacks. However, today's Honey nets produce an enormous amount of data which becomes a challenge to analyze. In this paper, we attempt to separate and identify scanning traffic from other types of traffic. To accomplish this, we have developed a tool that utilizes known data mining techniques to find the scanning activities in Honey net data, which is an aggregate traffic data collected by multiple Honey pots. Being able to identify scanning activities will allow security analysts to focus more on other types of traffic, and hence be able to study and analyze other types of attacks.",
keywords = "Data mining, Honeynet, Intrusion detection, Scanning",
author = "Sqalli, {Mohammed H.} and Shoieb Arshad and Mohammad Khalaf and Khaled Salah",
year = "2011",
doi = "10.1109/CICSyN.2011.47",
language = "British English",
isbn = "9780769544823",
series = "Proceedings - 3rd International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2011",
publisher = "IEEE Computer Society",
pages = "178--183",
booktitle = "Proceedings - 3rd International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2011",
address = "United States",
}