Dynamic Deploying Distributed Low-interaction Honeynet

نویسندگان

  • Haifeng Wang
  • Qingkui Chen
چکیده

Distributed virtual honeynet is an important security detection system to Worms, Botnet detection, Spam and Distributed Denial-Of-Service. The honeynet value significantly relies on the disguise capacity. The traditional deploying method is a static scheme that the configuration of honeynet is determined by security experts beforehand and unable to change after the deployment. The hackers or Botnet controllers identify the honeynet and may not trap into the same honeynet again. Therefore, the static deploying honeynet has relatively poor disguise capacity. To improve the disguise capacity, a novel dynamic deploying method is proposed that is capable of redeploying the honeynet in real time. The inducing degree is introduced to measure the disguise capacity by analyzing the inbound and outbound packets of the honeynet. When the inducing degree is less than a specific threshold, the dynamic deploying manager will be activated and to execuate the dynamic deploying algorithms. We have developed three novel dynamic deploying algorithms to solve the problem how to redeploy the honeynet and implemented a prototype for distributed virtual honeynet based on Honeyd. The experimental results of the simulation and real networks datasets demonstrate that the dynamic deploying approach is effective to enhance the disguise capacity of honeynet.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

HONEYNET SOLUTIONS A deployment guide

Honeynets provide network and system managers a unique intrusion detection and monitoring system that provides indications of malicious behavior in a near “false positive” proof manner. When deployed properly, these systems can provide warning of both inside and external network threats. However if the deployment is not tightly integrated into the existing topology and the honeynet is configure...

متن کامل

Dynamic Stabilization of Wind Farms Deploying Static Synchronous Series Compensator

Encountering series-compensated transmission lines, sub-synchronous resonance (SSR) may strike the power system by jeopardizing its stability and mechanical facilities. This paper aims to verify the capability of static synchronous series compensator (SSSC) in mitigating the mechanical and electrical oscillations such as SSR in wind farm integrations. A wind turbine with a self–excited inductio...

متن کامل

The Use of Honeynets to Increase Computer Network Security and User Awareness

In this paper, we address how honeynets, networks of computers intended to be compromised, can be used to increase network security in a large organizational environment. We outline the current threats Internet security is facing at present and show how honeynets can be used to learn about those threats for the future. We investigate issues researchers have to take into account before deploying...

متن کامل

CR-Honeynet: A learning & decoy based Sustenance Mechanism Against Jamming Attack in CRN

Cognitive Radio Network (CRN) enables secondary users to borrow unused spectrum from the proprietary users in a dynamic and opportunistic manner. However, dynamic and open access nature of available spectrum brings a serious challenge of sustenance amongst CRNs which makes them vulnerable to various spectrum etiquette attacks. Jamming-based denial of service (DoS) attack poses serious threats t...

متن کامل

Honeypot through Web (Honeyd@WEB): The Emerging of Security Application Integration

This paper discusses on the development of the Honeyd@WEB. Honeyd@WEB is a system that can deploy low-interaction, production, dynamic and manageable virtual honeypots via a web interface. It runs open source programs, such as P0f (a passive fingerprinting tool) and Honeyd (a low-interaction honeypot). Honeyd@WEB can automatically determine; how many honeypots to deploy, how to deploy them, and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JCP

دوره 7  شماره 

صفحات  -

تاریخ انتشار 2012