Behind the Scenes of Online Attacks: An Analysis of Exploitation Behaviors on the Web
Web attacks are nowadays one of the major threats on the Internet, and several studies have analyzed them, providing details on how they are performed and how they spread. However, no study seems to have sufficiently analyzed the typical behavior of an attacker after a website has been compromised. This paper presents the design, implementation, and deployment of a network of 500 fully functional honeypot websites, hosting a range of different services, whose aim is to attract attackers and collect information on what they do during and after their attacks. In 100 days of experiments, the authors' system automatically collected, normalized, and clustered over 85,000 files that were created during approximately 6,000 attacks.