A Dynamic Approach for Honeypot Management

Authors

  • Alireza Saeedi Islamic Azad University of Hamedan, Musivand Blv, Islamic Azad University St., Emam khomeini Blv., Hamedan, Iran
  • Hassan Khotanlou Computer Eng. Dep.- Bu-Ali Sina University- Fahmideh Ave. - 65174 - Hamedan - Iran
  • Mohammad Nassiri Computer Eng. Dep.- Bu-Ali Sina University- Fahmideh Ave. - 65174 - Hamedan - Iran
Abstract:

Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change the configuration of Honeypots based upon the analysis of the collected events from various network elements including routers, firewalls, spam identifiers and Honeypots. In this paper we will provide a method in which according to the behaviour of the attacks based on the reports sent from several elements of the network and also the defined rules of the system, the Honeynet is automatically configured so that the conditions are prepared for trapping the threats. The main idea in this method is that unlike the other methods which wait until the threat reaches the Honeypot, the latter are configured so that they move to attract the attacks. The present scheme has been evaluated in a real environment. The results of the evaluation, illustrated the efficiency of the suggested method.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

a dynamic approach for honeypot management

honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. most of the present honeypots are configured and installed on the network statically. in some cases considerations have been made on dynamic configuration of honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...

full text

A Dynamic Honeypot Design for Intrusion Detection

A modern technology in the area of intrusion detection is honeypot technology that unlike common IDSs tends to provide the attacker with all the necessary resources needed for a successful attack. Honeypots provide a platform for studying the methods and tools used by the intruders (blackhatcommunity), thus deriving their value from the unauthorized use of their resources. This paper discusses ...

full text

DarkNOC: Dashboard for Honeypot Management

Protecting computer and information systems from security attacks is becoming an increasingly important task for system administrators. Honeypots are a technology often used to detect attacks and collect information about techniques and targets (e.g., services, ports, operating systems) of attacks. However, managing a large and complex network of honeypots becomes a challenge given the amount o...

full text

a new approach to credibility premium for zero-inflated poisson models for panel data

هدف اصلی از این تحقیق به دست آوردن و مقایسه حق بیمه باورمندی در مدل های شمارشی گزارش نشده برای داده های طولی می باشد. در این تحقیق حق بیمه های پبش گویی بر اساس توابع ضرر مربع خطا و نمایی محاسبه شده و با هم مقایسه می شود. تمایل به گرفتن پاداش و جایزه یکی از دلایل مهم برای گزارش ندادن تصادفات می باشد و افراد برای استفاده از تخفیف اغلب از گزارش تصادفات با هزینه پائین خودداری می کنند، در این تحقیق ...

15 صفحه اول

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 1  issue 2

pages  104- 109

publication date 2012-12-01

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023