{"title":"Analysis of Network Threats Based on Data from Server-Traps","authors":"E. Sagatov, D. A. Shkirdov, A. Sukhov","doi":"10.1109/NTMS.2019.8763847","DOIUrl":null,"url":null,"abstract":"The paper presents the results of data analysis from a geographically distributed network of honeypot servers. A network of 4 honeypot servers was deployed more than two years ago. Analysis of the collected data has allowed us to build a network intrusion model. This model includes blacklists of attacking addresses for various internet services, statistics on the intensity of everyday intrusion attempts and an analysis of attacking addresses as belonging to providers of various countries. Special mention should be made of the ranked lists of major vulnerabilities that attackers use to attempt to break content management systems.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NTMS.2019.8763847","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The paper presents the results of data analysis from a geographically distributed network of honeypot servers. A network of 4 honeypot servers was deployed more than two years ago. Analysis of the collected data has allowed us to build a network intrusion model. This model includes blacklists of attacking addresses for various internet services, statistics on the intensity of everyday intrusion attempts and an analysis of attacking addresses as belonging to providers of various countries. Special mention should be made of the ranked lists of major vulnerabilities that attackers use to attempt to break content management systems.