An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation

Authors

  • Ali Barati Department of Computer Engineering, Dezful Branch, Islamic Azad University, Dezful, Iran
  • Mehdi Amiri Department of Computer Engineering, Dezful Branch, Islamic Azad University, Dezful, Iran
Abstract:

Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’ information and trap them. By using a vulnerable scanner in this paper, we obtained the required network vulnerabilities and normalized them via the proposed method. Then, a dynamic hybrid honeypot has proposed by high and low interaction honeypots. Also, in the proposed method, by footprinting and scanning of an integrated network, a detailed picture of the production network and a honeypot configuration file are generated. As a result, more devices could be detected via automated production by the proposed method. This method could accelerate honeypot production and reduce the users’ mistakes during their manual production. Monitoring network traffic, collecting the information of network machines, determining network operating systems, and storing data in a database are the specific features of this system that could be performed by using the selected network scanning tools and modules.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Advanced Honeypot Architecture for Network Threats

Title of Document: Advanced Honeypot Architecture for Network Threats Quantification Robin Berthier, Ph.D., 2009 Directed By: Associate Professor Michel Cukier, Reliability Engineering Program Today's world is increasingly relying on computer networks. The increase in the use of network resources is followed by a rising volume of security problems. New threats and vulnerabilities are discovered...

full text

A Hybrid Honeypot Architecture for Scalable Network Monitoring

To provide scalable, early warning and analysis of new Internet threats like worms or automated attacks, we propose a globally distributed, hybrid monitoring architecture that can capture and analyze new vulnerabilities and exploits as they occur. To achieve this, our architectures increases the exposure of high-interaction honeypots to these threats by employing low-interaction honeypots as fr...

full text

An Effective Technique for Endoscopic Resection of Advanced Stage Angiofibroma

Introduction: In recent years, the surgical management of angiofibroma has been greatly influenced by the use of endoscopic techniques. However, large tumors that extend into difficult anatomic sites present major challenges for management by either endoscopy or an open-surgery approach which needs new technique for the complete en block resection.   Materials and Methods: In a prospective obse...

full text

(WHASG) Automatic SNORT Signatures Generation by using Honeypot

An Intrusion detection system (IDS) is an important network security component that is used to monitor network traffic and detect attack attempts. A signature based intrusion detection system relies on a set of predefined signatures to detect an attack. Due to “zero-day” attacks (i.e. new unknown attacks) conventional IDS will not be able to detect these new attacks until the signatures are upd...

full text

An Autoconfigurated Hybrid Honeypot for Improving Security in Computer Systems

Providing computer system security is one of the important areas of consideration in Information Technology. There is a rapid advancement in this area because no one exactly wants his system to be attacked by an intruder and the data to be compromised. An experienced attacker may get to know the weaknesses of the system and may obtain the sensible data. So its necessary to give protection again...

full text

A framework for an automatic hybrid MPI+OpenMP code generation

Clusters of symmetric multiprocessors (SMPs) are the most currently used architecture for large scale applications and combining MPI and OpenMP models is regarded as a suitable programming model for such architectures. But writing efficient MPI+OpenMP programs requires expertise and performance analysis to determine the best number of processes and threads for the optimal execution for a given ...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 7  issue 2

pages  133- 144

publication date 2019-11-01

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023