A Distributed Honeypot System for Grid Security1
نویسندگان
چکیده
In this paper, we propose a distributed honeypot model for grid computing system security. Based on the IDS Snort and the firewall IPTable, we set up a testing environment and use a simple watching dog to manage capture data. We also discuss implementation of the system and some future research topics.
منابع مشابه
Security and Results of a Large-Scale High-Interaction Honeypot
This paper presents the design and discusses the results of a secured high-interaction honeypot. The challenge is to have a honeypot that welcomes attackers, allows userland malicious activities but prevents system corruption. The honeypot must authorize real malicious activities. It must ease the analysis of those activities. A clustered honeypot is proposed for two kinds of hosts. The first c...
متن کاملModel Predictive Control of Distributed Energy Resources with Predictive Set-Points for Grid-Connected Operation
This paper proposes an MPC - based (model predictive control) scheme to control active and reactive powers of DERs (distributed energy resources) in a grid - connected mode (either through a bus with its associated loads as a PCC (point of common coupling) or an MG (micro - grid)). DER may be a DG (distributed generation) or an ESS (energy storage system). In the proposed scheme, the set - poin...
متن کاملModeling of Wind Energy Conversion System Including DFIG for Distributed Generation Studies
A detailed model of wind power station, including Double Fed Induction Generator, DFIG is presented in this paper. Two control mechanisms are included in the model. The inner control system uses stator flux oriented control for the rotor side converter and grid voltage vector control for the grid side converter. The outer control system is used for wind turbine pitch angle. PSCAD/EMTDC is us...
متن کاملDesign and Analysis of Distributed Honeypot System
Honeypot technology has been widely used to overcome the limitations of firewall technology, many intrusion detection systems, intrusion prevention systems, which detected several attacks but couldnot detect new attacks. This paper discusses the honeypot technology according to the existed shortage in the honeypot system and proposes a distributed system which remedy the existing deficiency in ...
متن کاملCorrelation of System Events: High Performance Classification of Selinux Activities and Scenarios
This paper presents an architecture for the characterization and the classification of activities occurring in a computer. These activities are considered from a system point of view, currently dealing with information coming from SELinux system logs. Starting from system events, and following an incremental approach, this paper shows how to characterize high-level and macro activities occuring...
متن کامل