Honeypot still plays an important role in network security, especially in analyzing attack type and defining attacker patterns. Previous research has mainly focused on detecting attack pattern while categorization of type has not yet been-comprehensively discussed. Nowadays, the web application is the most common and popular way for users to gather information, but it also invites attackers to assault the system. Therefore, deployment of a web honeypot is important and its forensic analysis is urgently required. In this paper, authors propose attack type analysis from web honeypot log for forensic purposes. Every log is represented as a vertex in a graph. Then a custom agglomerative clustering to categorize attack type based on PHP-IDS rules is deployed. A visualization of large graphs is also provided since the actual logs contain tens of thousands of rows of records. The experimental results show that the proposed model can help forensic investigators examine a web honeypot log more precisely.

Original languageEnglish
Pages (from-to)60-65
Number of pages6
JournalJournal of Telecommunications and Information Technology
Issue number2
Publication statusPublished - 2016


  • Access log
  • Attack type
  • Graph agglomerative clustering
  • Visualization of large graphs


Dive into the research topics of 'Graph-based forensic analysis of web honeypot'. Together they form a unique fingerprint.

Cite this