Skip to main navigation Skip to search Skip to main content

An entropy and volume-based approach for identifying malicious activities in honeynet traffic

  • Mohammed H. Sqalli*
  • , Syed Naeem Firdous
  • , Zubair Baig
  • , Farag Azzedin
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

Honey nets are an increasingly popular choice deployed by organizations to lure attackers into a trap network, for collection and analysis of unauthorized network activity. A Honey net captures substantial amount of data and logs for analysis in order to identify malicious activities perpetrated by the hacker community. The analysis of this large amount of data is a challenging task. Through this paper, we propose a technique based on the entropy and volume thresholds of selected network features to efficiently analyze Honey net data, and identify malicious activities. Our technique consists of both feature-based and volume-based schemes to identify malicious activities in the Honey net traffic. Through deployment of our proposed approach, a detailed analysis of various traffic features is conducted and the most appropriate features for Honey net traffic are thereupon selected. The anomalies are identified using entropy distributions and volume distributions, along with their corresponding threshold levels. The proposed scheme proves to be effective in identifying most types of anomalies seen in Honey net traffic.

Original languageEnglish
Title of host publicationProceedings - 2011 International Conference on Cyberworlds, Cyberworlds 2011
Pages23-30
Number of pages8
DOIs
StatePublished - 2011

Publication series

NameProceedings - 2011 International Conference on Cyberworlds, Cyberworlds 2011

Keywords

  • Anomaly Detection
  • Cybersecurity
  • Entropy
  • Honeynet

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'An entropy and volume-based approach for identifying malicious activities in honeynet traffic'. Together they form a unique fingerprint.

Cite this