Journal of Applied Sciences1812-56541812-5662Asian Network for Scientific Information10.3923/jas.2010.196.202KimouK.P. BarryB. BabriM. OumtanagaS. KadjoT.L. 32010103The aim of this study is to provide a behavioral modeling of hackers for a better predisposition to secure the Internet. Thus, using data collected from the experimental platform of CADHo project, an efficient analysis of these data has been made. This preliminary study has identified the intruders most used ports (80, 135, 139 and 445). Using an approach based on Markov chains, we propose a predictive model characterizing the attack processes on a honeypot and emphasizing the most attacked ports during a given period. By computing the estimated errors, the efficiency of the proposed model is proved. This model is independent of any platform and can be generalized for any number of predetermined ports.]]>Alata, E., M. Dacier, Y. Deswarte, M. Kaaniche and K. Kortchinsky et al.,20052005Alata, E., M. Dacier, Y. Deswarte, M. Kaaniche and K. Kortchinsky et al.,20062006Kaber, S.M.,20022002Oudot, B.L. and V. Glaume,20032003Bremaud, P.,20012nd Edn.,Callegari, C., S. Vaton and M. Pagano,20082008pp: 441447Graham, C.,20081st Edn.,pp: 274pp: 274Haixiao, C., S. Kulkarni and S. Verdu,20065240084016Jha, S., K. Tan and R.A. Maxion,20012001pp: 206219Ju, W.H. and Y. Vardi,200110277295Kaaniche, M., Y. Deswarte, E. Alata, M. Dacier and V. Nicomette,20062006pp: 16Lockhart, A.,20042nd Edn.,pp: 348-412pp: 348-412Nong, Y.,20002000pp: 171174Nuel, G. and B. Prum,2007Collection bioinformatique).]]>2007Oumtanaga, S., K.P. Kimou and G.K. Kouadio,200617207211Spitzner, L.,2002pp: 480pp: 480Shannon, C.E.,194827379423