@article{(Open Science Index):https://publications.waset.org/pdf/15875,
	  title     = {Behavioral Signature Generation using Shadow Honeypot},
	  author    = {Maros Barabas and  Michal Drozd and  Petr Hanacek },
	  country	= {},
	  institution	= {},
	  abstract     = {A novel behavioral detection framework is proposed
to detect zero day buffer overflow vulnerabilities (based on network
behavioral signatures) using zero-day exploits, instead of the
signature-based or anomaly-based detection solutions currently
available for IDPS techniques. At first we present the detection
model that uses shadow honeypot. Our system is used for the online
processing of network attacks and generating a behavior detection
profile. The detection profile represents the dataset of 112 types of
metrics describing the exact behavior of malware in the network. In
this paper we present the examples of generating behavioral
signatures for two attacks – a buffer overflow exploit on FTP server
and well known Conficker worm. We demonstrated the visualization
of important aspects by showing the differences between valid
behavior and the attacks. Based on these metrics we can detect
attacks with a very high probability of success, the process of
detection is however very expensive.},
	    journal   = {International Journal of Computer and Information Engineering},
	  volume    = {6},
	  number    = {5},
	  year      = {2012},
	  pages     = {635 - 639},
	  ee        = {https://publications.waset.org/pdf/15875},
	  url   	= {https://publications.waset.org/vol/65},
	  bibsource = {https://publications.waset.org/},
	  issn  	= {eISSN: 1307-6892},
	  publisher = {World Academy of Science, Engineering and Technology},
	  index 	= {Open Science Index 65, 2012},
	}