If you go down to the Internet today – Deceptive Honeypots

نویسندگان

  • Suen Yek
  • Craig Valli
چکیده

ABSTRACT This is preliminary research into the effectiveness of deceptive defensive measures in particular honeypots that use deceit as a primary defensive and offensive mechanism. Initial research has been conducted using the Deception Tool Kit and its ability to fool commonly available network scanning tools such as Nessus and Nmap The preliminary research indicates that these deceptive tools have a place in modern network defence architecture.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving the Effectiveness of Deceptive Honeynets through an Empirical Learning Approach

Over the last few years, network based intrusions have increased rapidly, due to the increase and popularity of various attack tools easily available today. Due to this increase in intrusions, the concept of network Honeypots are being developed, which can be used to trap and decode the attack methods of the malicious attackers. This paper will review the current state of honeypot technology as...

متن کامل

What makes a good muffin ? Ivan

Today most cooking projects start off by consulting the Internet for recipes. A quick search for “chocolate chip muffins” returns a multitude of different recipes, and typically, we would look though the top rated ones and try to decide which one “looks best”. We would go down the ingredients list, make a few substitutions, depending on what’s left in the fridge, and maybe scale down the recipe...

متن کامل

Is Honeyd Effective or Not?

Honeypots are designed to ensnare attackers and monitor their activities. Honeypots use the principles of deception such as masking, mimicry, decoying, inventing, repackaging and dazzling to deceive attackers. This paper describes the framework of how to improve the effectiveness of honeypots through the effective use of deception. In this research a legitimate corporate deceptive network is cr...

متن کامل

Medium Interaction Honeypots

Autonomously spreading malware has been a global threat to the Internet Community ever since the existence of the Internet as a large-scale computer network. A specialization of this threat are botnets; recent trends towards commercialization of botnets made the situation even worse. This document outlines the weaknesses of different existing approaches to catch malware – especially bots – and ...

متن کامل

Editorial: What Is Brain Mapping?

G20 World Brain Mapping Initiative (Neuroscience/N-20) is Putting Brain Mapping on the top of Global Economic Issues The Society for Brain Mapping, Therapeutics, and Brain Mapping Foundation are propelling therapeutic advances in Nano-Neurosurgery, Nano-Bio-Electronics, Artificial Intelligence, Neuro-Supercomputing and ‘cross-pollination’ among the bio-medical sciences and engine...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003