A Graph Theory Based Self-Learning Honeypot to Detect Persistent Threats
نویسندگان
چکیده
Attacks on the cyber space is getting exponential in recent times. Illegal penetrations and breaches are real threats to individuals organizations. Conventional security systems good enough detect known but when it comes Advanced Persistent Threats (APTs) they fails. These APTs targeted, more sophisticated very persistent incorporates lot of evasive techniques bypass existing defenses. Hence, there a need for an effective defense system that can achieve complete reliance security. To address above-mentioned issues, this paper proposes novel honeypot tracks anonymous behavior APT threats. The key idea leverages concepts graph theory such targeted attacks. proposed self-realizing, strategic assisted which withholds actionable observes analysis modelling. based self learning using results γ(C(n,1)),γc (C(n,1)), γsc (C(n,1)) outperforms traditional by detecting behavioral with detection rate 96%.
منابع مشابه
Anomaly Detection in Log Data using Graph Databases and Machine Learning to Defend Advanced Persistent Threats
Advanced Persistent Threats (APTs) are a main impendence in cyber security of computer networks. In 2015, a successful breach remains undetected 146 days on average, reported by [Fi16]. With our work we demonstrate a feasible and fast way to analyse real world log data to detect breaches or breach attempts. By adapting well-known kill chain mechanisms and a combine of a time series database and...
متن کاملMeasuring Security Threats with Honeypot Technology
Honeypots are electronic baits, i.e. network resources (computers, routers, switches, etc.) deployed to be probed, attacked and compromised. Honeypots run special software which permanently collects data about the system behavior and greatly aids in post-incident computer and network forensics. Several honeypots can be assembled into networks of honeypots called honeynets. Through the wealth of...
متن کاملAdvanced Honeypot Architecture for Network Threats
Title of Document: Advanced Honeypot Architecture for Network Threats Quantification Robin Berthier, Ph.D., 2009 Directed By: Associate Professor Michel Cukier, Reliability Engineering Program Today's world is increasingly relying on computer networks. The increase in the use of network resources is followed by a rising volume of security problems. New threats and vulnerabilities are discovered...
متن کاملIoTPOT: A Novel Honeypot for Revealing Current IoT Threats
We analyze the increasing threats against IoT devices. We show that Telnet-based attacks that target IoT devices have rocketed since 2014. Based on this observation, we propose an IoT honeypot and sandbox, which attracts and analyzes Telnet-based attacks against various IoT devices running on different CPU architectures such as ARM, MIPS, and PPC. By analyzing the observation results of our hon...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Intelligent Automation and Soft Computing
سال: 2023
ISSN: ['2326-005X', '1079-8587']
DOI: https://doi.org/10.32604/iasc.2023.028029