Data analytics for modeling and visualizing attack behaviors: A case study on SSH brute force attacks
dc.contributor.author | Yao, Chengchao | |
dc.contributor.author | Luo, Xiao | |
dc.contributor.author | Zincir-Heywood, A. Nur | |
dc.contributor.department | Computer and Information Science, School of Science | en_US |
dc.date.accessioned | 2019-02-28T16:25:31Z | |
dc.date.available | 2019-02-28T16:25:31Z | |
dc.date.issued | 2017-11 | |
dc.description.abstract | In this research, we explore a data analytics based approach for modeling and visualizing attack behaviors. To this end, we employ Self-Organizing Map and Association Rule Mining algorithms to analyze and interpret the behaviors of SSH brute force attacks and SSH normal traffic as a case study. The experimental results based on four different data sets show that the patterns extracted and interpreted from the SSH brute force attack data sets are similar to each other but significantly different from those extracted from the SSH normal traffic data sets. The analysis of the attack traffic provides insight into behavior modeling for brute force SSH attacks. Furthermore, this sheds light into how data analytics could help in modeling and visualizing attack behaviors in general in terms of data acquisition and feature extraction. | en_US |
dc.eprint.version | Author's manuscript | en_US |
dc.identifier.citation | Yao, C., Luo, X., & Zincir-Heywood, A. N. (2017). Data analytics for modeling and visualizing attack behaviors: A case study on SSH brute force attacks. In 2017 IEEE Symposium Series on Computational Intelligence (SSCI) (pp. 1–8). https://doi.org/10.1109/SSCI.2017.8280913 | en_US |
dc.identifier.uri | https://hdl.handle.net/1805/18511 | |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.isversionof | 10.1109/SSCI.2017.8280913 | en_US |
dc.relation.journal | 2017 IEEE Symposium Series on Computational Intelligence | en_US |
dc.rights | Publisher Policy | en_US |
dc.source | Author | en_US |
dc.subject | data visualization | en_US |
dc.subject | self-organizing feature maps | en_US |
dc.subject | data analytics | en_US |
dc.title | Data analytics for modeling and visualizing attack behaviors: A case study on SSH brute force attacks | en_US |
dc.type | Article | en_US |