Honeypot-based Forensics

  title={Honeypot-based Forensics},
  author={Fabien Pouget},
Some attacks on honeypots are very frequent and repetitive. In addition, such repetitive attacks generate a very large amount of data. In this paper, we show that it might be misleading to consider general statistics obtained on these data without carrying an in depth analysis of the various processes that have led to their creation. We show that such analysis can be done by means of a simple clustering approach. We present an algorithm to characterize the root causes of these attacks. This… CONTINUE READING
Highly Cited
This paper has 61 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 41 extracted citations

62 Citations

Citations per Year
Semantic Scholar estimates that this publication has 62 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 19 references

Anti-Honeypot Technology

  • N. Krawtez
  • IEEE Security and Privacy. Vol 2, Nb 1, p. 76-78
  • 2004


  • M. Dacier, F. Pouget, H. Debar
  • a Practical Mean to Validate Malicious Fault…
  • 2004
1 Excerpt

Finding Association Rules/Hyperedges with the Apriori Algorithm

  • C. Borgelt
  • Dpt of Knowledge Processing and Language…
  • 2003
1 Excerpt


  • F. Pouget, M. Dacier
  • Debar: “Honeypot: a comparative survey”. Eurecom…
  • 2003
1 Excerpt

IDS Logs in Forensics Investigations: An Analysis of a Compromised Honeypot

  • A. Neville
  • March
  • 2003

Honeypots: Tracking Hackers

  • L. Spitzner
  • Addislon-Wesley, ISBN from-321-10895-7
  • 2002


  • R. J. Latino
  • latino, “Root Cause Analysis: Improving…
  • 2002

Similar Papers

Loading similar papers…