Design and Implementation of Virtual Client Honeypot
نویسندگان
چکیده
Computers security has become a major issue in many organization. There are different solutions to response to this needs but they remain insufficient to truly secure network. Honeypot is used in the area of computer and Internet Security. It is resource which is intended to be attacked and comprised to gain more information about the attacker and their attack techniques. Compared to an intrusion detection system, Honeypots have the big advantage that they do not generate false alerts as all traffic is suspicious, because no productive components are running on the system. Client Honeypot is a honeypot actively searches for malicious sites on the web. In this paper, we design and implement virtual Client Honeypot to collect the internet malwares.
منابع مشابه
Design and Implementation of Linux Based Hybrid Client Honeypot Incorporating Multi Layer Detection
In current global internet cyber space, the number of targeted client side attacks are increasing that lead users to adversaries' web sites and exploit web browser vulnerabilities is increasing, therefore there is requirement of strong mechanisms to fight against these kinds of attacks. In this paper, we present the design and implementation of a client honeypot which incorporate the functional...
متن کاملIAEA-CN-228-127 1 The design and implementation of a PLC honeypot for detecting cyber attacks against industrial control systems
Programmable logic controllers (PLCs) are used widely to control industrial processes and communicate with the supervisory system. Until recently, industrial operators relied on the assumption that these PLCs are isolated from the online world and hence cannot be the target of attacks. Recent events, such as the infamous Stuxnet attack directed the attention of the security and control system c...
متن کاملImproving exposure of intrusion deception system through implementation of hybrid honeypot
This paper presents a new design hybrid honeypot to improve the exposure aspect of intrusion deception systems and in particular, research server honeypots. A major attribute in the design of a server honeypot is its passiveness, which allows the honeypot to expose its services and passively wait to be attacked. Although passiveness of a server honeypot simplifies the analysis process by classi...
متن کاملCollapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention
The honeypot has emerged as an effective tool to provide insights into new attacks and exploitation trends. However, a single honeypot or multiple independently operated honeypots only provide limited local views of network attacks. Coordinated deployment of honeypots in different network domains not only provides broader views, but also create opportunities of early network anomaly detection, ...
متن کاملCryPLH: Protecting Smart Energy Systems from Targeted Attacks with a PLC Honeypot
Smart grids consist of suppliers, consumers, and other parts. The main suppliers are normally supervised by industrial control systems. These systems rely on programmable logic controllers (PLCs) to control industrial processes and communicate with the supervisory system. Until recently, industrial operators relied on the assumption that these PLCs are isolated from the online world and hence c...
متن کامل