Data Mining Algorithms in the Analysis of Security Logs from a Honeypot System

Michał Buda , Ilona Bluemke


Today many applications move to the Internet as web applications. This phenomenon causes new opportunities for attackers to take over servers or steal sensitive data such as credit card numbers, personal or corporate data. In this paper some analyses of data from a honeypot system of web application, implemented at the Institute of Computer Science, Warsaw University of Technology, are presented. The implemented honeypot has its own management software that helps to analyze the stored data. The honeypot was operating almost one year. Several data mining techniques were used to analyze the data collected by the honeypot and to detect important patterns and attacks. In this paper the results of the usage of algorithms MaxMiner and SED in the analysis of logs are presented.
Author Michał Buda II
Michał Buda,,
- The Institute of Computer Science
, Ilona Bluemke II
Ilona Bluemke,,
- The Institute of Computer Science
Publication size in sheets0.5
Book Zamojski Wojciech, Mazurkiewicz Jacek, Sugier Jarosław, Walkowiak Tomasz, Kacprzyk Janusz (eds.): Dependability Engineering and Complex Systems. Proceedings of the Eleventh International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, Advances in Intelligent Systems and Computing, vol. 470, 2016, Springer International Publishing, ISBN 978-3-319-39638-5, [978-3-319-39639-2], 606 p., DOI:10.1007/978-3-319-39639-2
Keywords in EnglishHoneypot, Security, Data-mining
projectDevelopment of new algorithms in the areas of software and computer architecture, artificial intelligence and information systems and computer graphics . Project leader: Rybiński Henryk, , Phone: +48 22 234 7731, start date 18-05-2015, end date 30-11-2016, II/2015/DS/1, Completed
WEiTI Działalność statutowa
Languageen angielski
Depcos_MBuda_IBlu.pdf 84.09 KB
Score (nominal)15
ScoreMinisterial score = 15.0, 27-03-2017, BookChapterSeriesAndMatConf
Ministerial score (2013-2016) = 15.0, 27-03-2017, BookChapterSeriesAndMatConf
Citation count*3 (2018-06-13)
Share Share

Get link to the record

* presented citation count is obtained through Internet information analysis and it is close to the number calculated by the Publish or Perish system.