Abstract:
The paper presents the results of data analysis from a geographically distributed network of honeypot servers. A network of 4 honeypot servers was deployed more than two ...Show MoreMetadata
Abstract:
The paper presents the results of data analysis from a geographically distributed network of honeypot servers. A network of 4 honeypot servers was deployed more than two years ago. Analysis of the collected data has allowed us to build a network intrusion model. This model includes blacklists of attacking addresses for various internet services, statistics on the intensity of everyday intrusion attempts and an analysis of attacking addresses as belonging to providers of various countries. Special mention should be made of the ranked lists of major vulnerabilities that attackers use to attempt to break content management systems.
Published in: 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
Date of Conference: 24-26 June 2019
Date Added to IEEE Xplore: 15 July 2019
ISBN Information: