Abstract
In recent days, cyber-attacks are rising rapidly by using various new techniques. These attacks have huge impact on organizational and an individual security. As many times an attack has been detected but it is too late to recover the damage perform by that attack. To study on previous attacks some organizations like Defense Advanced Research Project Agency (DARPA) provide offline dataset for researchers. KDD and DARPA dataset attributes was playing a good role in detection of many attacks and further useful in prevention of attacks also. But in recent days, dataset provided by them, become old one and not gives fruitful results. To keep in mind, the technique used in this research work is providing machine readable dataset attributes of specific attacks in a standard format which is CSV (Comma Separated Values) format. The attack data is captured by deploying various honeypot sensors. The achievement of this research work is “sharing of targeted attack data like Brute force Attack, Exploits etc., in machine readable form in standard format”. This information is useful for security researchers, situational awareness programs and security communities. Security testing is another area, also needs some dataset attributes for security testing of the softwares or tools.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Masato Terada: Work on Cyber Security Measures for Collaboration between Organizations: Vol. 65, No. 1 in 2016.
Ashima Rattan, Navroop Kaur, Saurabh Chamotra and Shashi Bhusan: Attack Data Usability and Challenges in its Capturing and Sharing In the 3rd International Conference on Cyber Security (ICCS-2017) at Rajasthan Technical University Kota (Rajasthan), Published in “International Journal of Advanced Studies in Computer Science and Engineering” (IJASCSE): Vol-6-theme-based-issue-9.
Vijay Varadharajan: On Malware Characterization and Attack Classification: Proceedings of the First Australasian Web Conference (AWC ‘13), Vol. 144, 43–47 in 2013.
Ashima Rattan and Shashi Bushan: IP Reputation Engine Based upon Malicious Events In the proceedings of the 11th INDIACom 2017 in the IEEE 4th International conference on “Computing for Sustainable Global Development”, March 2017.
Sean Barnum: Standardizing Cyber Threat Intelligence Information with the Structured Threat Information expression (STIX™): Version-1.1, Revision-1 in Feb 20, 2014.
Panos Kampanakis: Security automation and threat information-sharing options: co-publish by the IEEE computer and reliability societies: Vol. 12, Issue-5, 42–51 in September/October 2014.
Kutub Thakur Meikang Qiu Keke Gai and Md Liakat Ali: An Investigation on Cyber Security Threats and Security Models in the IEEE 2nd International Conference on Cyber Security and Cloud Computing: 978-1-4673-9300-3/15, pp. 307–311, 2015.
Komal K. More and Prof. Pramod B. Gosavi: A Real Time System for Denial of service Attack Detection Based on Multivariate Correlation Analysis Approach in IEEE International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT): 978-1-4673-9939-5/16/, pp. 1125–1131, 2016.
Saoreen Rahman, Muhammad Ahmed and M. Shamim Kaiser: ANFIS Based Cyber Physical Attack Detection System in IEEE 5th International Conference on Informatics, Electronics and Vision (ICIEV): 978-1-5090-1269-5/16/, pp. 944–948, 2016.
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver: Inside the slammer worm: In Proceedings of IEEE Security and Privacy: Vol. 1, Issue: 4, 33–39 in June 2003.
Dhanashri Ashok Bhosale and Vanita Manikrao Mane: Comparative Study and Analysis of Network Intrusion Detection Tools: International Conference on Applied and Theoretical Computing and Communication Technology (ICATCCT), 312–315, in 2015.
Ulrik Franke, Joel Brynielsson: Cyber situational awareness A systematic review of the literature, Computers & Security, Volume 46, Pages 18–31 in October 2014.
Guodong Zhao, Ke Xu, Lei Xu, and Bo Wu; “Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis”, IEEE 20 July 2015, pp. 1132–1142.
Jessica Steinberger, Anna Sperottoz, Mario Gollingy and Harald Baier: How to Exchange Security Events? Overview and Evaluation of Formats and Protocols in Biometrics and Internet Security: IEEE International Symposium on Integrated Network Management (IM2015), Darmstadt, Germany 2015.
M. Dacier, F. Pouget, and H. Debar: Attack processes found on the internet: NATO Research and technology symposium IST-041 “Adaptive Defence in Unclassified Networks”, 19 April 2004, Toulouse, France.
Honeynet.org.
Dikshant Gupta, Suhani Singhal, Shamita Malik and Archana Singh: Network Intrusion Detection System Using various data mining techniques in IEEE International Conference on Research Advances in Integrated Navigation Systems (RAINS - 2016), April 06–07, 2016, R. L. Jalappa Institute of Technology, Doddaballapur, Bangalore, India: 978-1-4673-8819-8/16/, 2016.
Logrhythm Labs Embedded Expertise on Security Analysis Suite-Honeypot.
Sanjeev Kumar, Rakesh Sehgal and J.S. Bhatia: Hybrid Honeypot Framework for Malware Collection and Analysis in IEEE 7th International Conference on Industrial and Information Systems (ICIIS-2012), August 6–9, 2012, IIT Chennai, Published in IEEE Xplore.
Daniel Ramsbrock: Profiling Attacker Behavior Following SSH Compromises: Department of Computer Science University of Maryland, College Park in 2007.
Eric Ziegast, Paul Vixie: Domain Name Service Based block List in 1997.
CERT Polska and European Union Agency for Network and Information Security (ENISA) team: Standards and tools for exchange and processing of actionable information in November 2014.
Nazmul Shahadat, Imam Hossain, Anisur Rohman and Nawshi Matin: Experimental Analysis of Data Mining Application for Intrusion Detection with Feature reduction in International Conference on Electrical, Computer and Communication Engineering (ECCE), February 16–18, 2017, Cox’s Bazar, Bangladesh, pp. 209–216.
Zhang, Xiaoming, and Guang Wang. “Hadoop-Based System Design for Website Intrusion Detection and Analysis.” 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity), IEEE, 2015.
El Mostapha Chakir, Mohamed Moughit And Youness Idrissi Khamlichi: An Efficient Method for Evaluating Alerts of Intrusion Detection Systems in the conference of IEEE 978-1-5090-6681-0/17/ in 2017.
V. Yegneswaran, P. Barford, and D. Plonka: Design and use of internet sinks for network abuse monitoring: Lecture Notes in Computer Science book series (LNCS), Vol. 3224, Springer, Berlin, Heidelberg 2004.
Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A. Ghorbani: A Detailed Analysis of the KDD CUP 99 Data Set in the conference of IEEE in 2009.
Mike Schiffman: Cisco Systems on The Common Vulnerability Reporting Framework An Internet Consortium for Advancement of Security on the Internet (ICASI) Whitepaper in 2011.
Abdul Razzaq, Ali Hur, H Farooq Ahmad, Muddassar Masood: Cyber Security: Threats, Reasons, Challenges, Methodologies and State of the Art Solutions for Industrial Applications 2013 in the conference of IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS), 1–6. 2013.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Rattan, A., Kaur, N., Bhushan, S. (2019). Standardization of Intelligent Information of Specific Attack Trends. In: Panigrahi, C., Pujari, A., Misra, S., Pati, B., Li, KC. (eds) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol 714. Springer, Singapore. https://doi.org/10.1007/978-981-13-0224-4_7
Download citation
DOI: https://doi.org/10.1007/978-981-13-0224-4_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0223-7
Online ISBN: 978-981-13-0224-4
eBook Packages: EngineeringEngineering (R0)