This paper proposes the use of a data mining techniques to analyse the data recorded by the honeypot. This data can also be used to train Intrusion Detection Systems (IDS) in identifying attacks. Since the training is based on real data it will better identify and classify attacks than the rule based intrusion IDS’s
Reference:
Veerasamy, N, Mokhonoana, PM and Vorster, J. 2006. Applying data-mining techniques in honeypot analysis. Information Security South Africa conference (ISSA2006), 1-5 July, pp 9.
Veerasamy, N., Mokhonoana, P., & Vorster, J. (2006). Applying data-mining techniques in honeypot analysis. http://hdl.handle.net/10204/3127
Veerasamy, Namosha, PM Mokhonoana, and J Vorster. "Applying data-mining techniques in honeypot analysis." (2006): http://hdl.handle.net/10204/3127
Veerasamy N, Mokhonoana P, Vorster J, Applying data-mining techniques in honeypot analysis; 2006. http://hdl.handle.net/10204/3127 .