IEEE/ICACT20230048 Slide.06        [Big Slide]       [YouTube] Oral Presentation
First, let's briefly describe the entire process. We set up a Honeypot to collect information from attackers, and the collected data is formed into multiple clusters using the K-means algorithm. Then, the attributes of each cluster are manually tagged through MITRE ATT&CK. The TF-IDF value of each payload is calculated, and the tagged data, data-related information, and TF-IDF calculation score are saved in the Session Table.

[Go to Next Slide]
Select Voice: