Jan. 9, 2023, 2:10 a.m. | Francesco Sanna Passino, Anastasia Mantziou, Daniyar Ghani, Philip Thiede, Ross Bevington, Nicholas A. Heard

cs.CR updates on arXiv.org arxiv.org

Cyber-systems are under near-constant threat from intrusion attempts. Attacks
types vary, but each attempt typically has a specific underlying intent, and
the perpetrators are typically groups of individuals with similar objectives.
Clustering attacks appearing to share a common intent is very valuable to
threat-hunting experts. This article explores topic models for clustering
terminal session commands collected from honeypots, which are special network
hosts designed to entice malicious attackers. The main practical implications
of clustering the sessions are two-fold: finding similar …

article attack attacks clustering cyber data detection experts honeypot honeypots hunting intent intrusion malicious near network objectives session share special systems terminal threat types under

Enterprise Threat Intel Analyst

@ Resource Management Concepts, Inc. | Quantico, Virginia, United States

IT Security Engineer III

@ Mitsubishi Heavy Industries | Houston, TX, US, 77046

Cyber Intelligence Vice President, Threat Intelligence

@ JPMorgan Chase & Co. | Singapore, Singapore

Assistant Manager, Digital Forensics

@ Interpath Advisory | Manchester, England, United Kingdom

Tier 3 - Forensic Analyst, SME

@ Resource Management Concepts, Inc. | Quantico, Virginia, United States

Incident Response, SME

@ Resource Management Concepts, Inc. | Quantico, Virginia, United States