Detecting Emerging Large-Scale Vulnerability Scanning Activities by Correlating Low-Interaction Honeypots with Darknet.
Ryoh AkiyoshiDaisuke KotaniYasuo OkabePublished in: COMPSAC (2) (2018)
Keyphrases
- malicious activities
- interaction design
- real life
- human computer interaction
- small scale
- automatic detection
- data mining
- activity recognition
- human interactions
- intrusion detection system
- interaction patterns
- group activities
- high levels
- human robot interaction
- human interaction
- user interaction
- active participation
- face to face interactions
- data sets
- group discussion
- behavioral patterns
- structured light
- human activities
- image processing
- decision making
- genetic algorithm