OCHD: Preserving Obliviousness Characteristic of Honeypot Database

نویسندگان

  • Shyam K. Gupta
  • Renu Damor
  • Anand Gupta
  • Vikram Goyal
چکیده

The objective of honeypot database (context honeypot) is to identify a potential privacy violator. A suspected user’s interaction with the database is analyzed to determine suspicion. Such a system must satisfy certain characteristics. One of the such characteristics is obliviousness. The success of such a system depends on its remaining oblivious to the suspected user. In this demo paper, we describe the architecture and workflow of such a system, abbreviated as OCHD (Obliviousness Characteristic of Honeypot Database).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preserving Obliviousness Characteristic of Honeypot database

The concept of honeypot has been explored by many researchers in the network domain. We have proposed database honeypots and have given its architecture[5]. The use of such a honeypot is to identify potential attackers before an attack actually takes place. The privacy policy as advocated in [6] is expected to deny the access to a suspected user. However, one would like to identify the suspecte...

متن کامل

An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation

Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...

متن کامل

Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions

Aggregator oblivious encryption was proposed by Shi et al. (NDSS 2011), where an aggregator can compute an aggregated sum of data and is unable to learn anything else (aggregator obliviousness). Since the aggregator does not learn individual data that may reveal users’ habits and behaviors, several applications, such as privacy-preserving smart metering, have been considered. In this paper, we ...

متن کامل

Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients

Client-side attacks are on the rise: malicious websites that exploit vulnerabilities in the visitor’s browser are posing a serious threat to client security, compromising innocent users who visit these sites without having a patched web browser. Currently, there is neither a freely available comprehensive database of threats on the Web nor sufficient freely available tools to build such a datab...

متن کامل

A Dynamic Approach for Honeypot Management

Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006