{"title":"人类与机器人:在蜜罐环境中检测人类攻击","authors":"Shreya Udhani, A. Withers, Masooda N. Bashir","doi":"10.1109/ISDFS.2019.8757534","DOIUrl":null,"url":null,"abstract":"The increase in the automated attacks has motivated security researchers to focus on identifying patterns of attacker to safeguard the system. Humans have some basic behavioral characteristics and limitations, which can be identified and used to distinguish them from automated attackers. The network log data collected from a Honeypot uncovers such traits which are otherwise not noticeable. The paper analyses a SSH-based Honeypot deployed over a period of 423 days to identify human behavior traits which can essentially distinguish an automated attacker and a human attacker.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Human vs Bots: Detecting Human Attacks in a Honeypot Environment\",\"authors\":\"Shreya Udhani, A. Withers, Masooda N. Bashir\",\"doi\":\"10.1109/ISDFS.2019.8757534\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The increase in the automated attacks has motivated security researchers to focus on identifying patterns of attacker to safeguard the system. Humans have some basic behavioral characteristics and limitations, which can be identified and used to distinguish them from automated attackers. The network log data collected from a Honeypot uncovers such traits which are otherwise not noticeable. The paper analyses a SSH-based Honeypot deployed over a period of 423 days to identify human behavior traits which can essentially distinguish an automated attacker and a human attacker.\",\"PeriodicalId\":247412,\"journal\":{\"name\":\"2019 7th International Symposium on Digital Forensics and Security (ISDFS)\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 7th International Symposium on Digital Forensics and Security (ISDFS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISDFS.2019.8757534\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDFS.2019.8757534","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Human vs Bots: Detecting Human Attacks in a Honeypot Environment
The increase in the automated attacks has motivated security researchers to focus on identifying patterns of attacker to safeguard the system. Humans have some basic behavioral characteristics and limitations, which can be identified and used to distinguish them from automated attackers. The network log data collected from a Honeypot uncovers such traits which are otherwise not noticeable. The paper analyses a SSH-based Honeypot deployed over a period of 423 days to identify human behavior traits which can essentially distinguish an automated attacker and a human attacker.