A Dynamic Approach for Honeypot Management
Authors
Abstract:
Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change the configuration of Honeypots based upon the analysis of the collected events from various network elements including routers, firewalls, spam identifiers and Honeypots. In this paper we will provide a method in which according to the behaviour of the attacks based on the reports sent from several elements of the network and also the defined rules of the system, the Honeynet is automatically configured so that the conditions are prepared for trapping the threats. The main idea in this method is that unlike the other methods which wait until the threat reaches the Honeypot, the latter are configured so that they move to attract the attacks. The present scheme has been evaluated in a real environment. The results of the evaluation, illustrated the efficiency of the suggested method.
similar resources
a dynamic approach for honeypot management
honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. most of the present honeypots are configured and installed on the network statically. in some cases considerations have been made on dynamic configuration of honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...
full textA Dynamic Honeypot Design for Intrusion Detection
A modern technology in the area of intrusion detection is honeypot technology that unlike common IDSs tends to provide the attacker with all the necessary resources needed for a successful attack. Honeypots provide a platform for studying the methods and tools used by the intruders (blackhatcommunity), thus deriving their value from the unauthorized use of their resources. This paper discusses ...
full textDarkNOC: Dashboard for Honeypot Management
Protecting computer and information systems from security attacks is becoming an increasingly important task for system administrators. Honeypots are a technology often used to detect attacks and collect information about techniques and targets (e.g., services, ports, operating systems) of attacks. However, managing a large and complex network of honeypots becomes a challenge given the amount o...
full texta new approach to credibility premium for zero-inflated poisson models for panel data
هدف اصلی از این تحقیق به دست آوردن و مقایسه حق بیمه باورمندی در مدل های شمارشی گزارش نشده برای داده های طولی می باشد. در این تحقیق حق بیمه های پبش گویی بر اساس توابع ضرر مربع خطا و نمایی محاسبه شده و با هم مقایسه می شود. تمایل به گرفتن پاداش و جایزه یکی از دلایل مهم برای گزارش ندادن تصادفات می باشد و افراد برای استفاده از تخفیف اغلب از گزارش تصادفات با هزینه پائین خودداری می کنند، در این تحقیق ...
15 صفحه اولMy Resources
Journal title
volume 1 issue 2
pages 104- 109
publication date 2012-12-01
By following a journal you will be notified via email when a new issue of this journal is published.
Keywords
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023