Quality of Protection

Volume 23 of the series Advances in Information Security pp 79-91

Collection and analysis of attack data based on honeypots deployed on the Internet

  • E. AlataAffiliated withLAAS-CNRS
  • , M. DacierAffiliated withEurecom
  • , Y. DeswarteAffiliated withLAAS-CNRS
  • , M. KaaânicheAffiliated withLAAS-CNRS
  • , K. KortchinskyAffiliated withCERT-RENATER
  • , V. NicometteAffiliated withLAAS-CNRS
  • , V. H. PhamAffiliated withEurecom
  • , F. PougetAffiliated withEurecom


The CADHo project (Collection and Analysis of Data from Honeypots) is an ongoing research action funded by the French ACI “Securiteé & Informatique” [1]. It aims at building an environment to better understand threats on the Internet and also at providing models to analyze the observed phenomena. Our approach consists in deploying and sharing with the scientific community a distributed platform based on honeypots that gathers data suitable to analyze the attack processes targeting machines connected to the Internet. This distributed platform, called Leurreé.com and administrated by Institut Eurecom, offers each partner collaborating to this initiative access to all collected data in order to carry out statistical analyzes and modeling activities. So far, about thirty honeypots have been operational for several months in twenty countries of the five continents. This paper presents a brief overview of this distributed platform and examples of results derived from the data. It also outlines the approach investigated to model observed attack processes and to describe the intruders behaviors once they manage to get access to a target machine.