An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation

نویسندگان

  • Ali Barati Department of Computer Engineering, Dezful Branch, Islamic Azad University, Dezful, Iran
  • Mehdi Amiri Department of Computer Engineering, Dezful Branch, Islamic Azad University, Dezful, Iran
چکیده مقاله:

Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’ information and trap them. By using a vulnerable scanner in this paper, we obtained the required network vulnerabilities and normalized them via the proposed method. Then, a dynamic hybrid honeypot has proposed by high and low interaction honeypots. Also, in the proposed method, by footprinting and scanning of an integrated network, a detailed picture of the production network and a honeypot configuration file are generated. As a result, more devices could be detected via automated production by the proposed method. This method could accelerate honeypot production and reduce the users’ mistakes during their manual production. Monitoring network traffic, collecting the information of network machines, determining network operating systems, and storing data in a database are the specific features of this system that could be performed by using the selected network scanning tools and modules.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Advanced Honeypot Architecture for Network Threats

Title of Document: Advanced Honeypot Architecture for Network Threats Quantification Robin Berthier, Ph.D., 2009 Directed By: Associate Professor Michel Cukier, Reliability Engineering Program Today's world is increasingly relying on computer networks. The increase in the use of network resources is followed by a rising volume of security problems. New threats and vulnerabilities are discovered...

متن کامل

A Hybrid Honeypot Architecture for Scalable Network Monitoring

To provide scalable, early warning and analysis of new Internet threats like worms or automated attacks, we propose a globally distributed, hybrid monitoring architecture that can capture and analyze new vulnerabilities and exploits as they occur. To achieve this, our architectures increases the exposure of high-interaction honeypots to these threats by employing low-interaction honeypots as fr...

متن کامل

An Effective Technique for Endoscopic Resection of Advanced Stage Angiofibroma

Introduction: In recent years, the surgical management of angiofibroma has been greatly influenced by the use of endoscopic techniques. However, large tumors that extend into difficult anatomic sites present major challenges for management by either endoscopy or an open-surgery approach which needs new technique for the complete en block resection.   Materials and Methods: In a prospective obse...

متن کامل

(WHASG) Automatic SNORT Signatures Generation by using Honeypot

An Intrusion detection system (IDS) is an important network security component that is used to monitor network traffic and detect attack attempts. A signature based intrusion detection system relies on a set of predefined signatures to detect an attack. Due to “zero-day” attacks (i.e. new unknown attacks) conventional IDS will not be able to detect these new attacks until the signatures are upd...

متن کامل

An Autoconfigurated Hybrid Honeypot for Improving Security in Computer Systems

Providing computer system security is one of the important areas of consideration in Information Technology. There is a rapid advancement in this area because no one exactly wants his system to be attacked by an intruder and the data to be compromised. An experienced attacker may get to know the weaknesses of the system and may obtain the sensible data. So its necessary to give protection again...

متن کامل

A framework for an automatic hybrid MPI+OpenMP code generation

Clusters of symmetric multiprocessors (SMPs) are the most currently used architecture for large scale applications and combining MPI and OpenMP models is regarded as a suitable programming model for such architectures. But writing efficient MPI+OpenMP programs requires expertise and performance analysis to determine the best number of processes and threads for the optimal execution for a given ...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ذخیره در منابع من قبلا به منابع من ذحیره شده

{@ msg_add @}


عنوان ژورنال

دوره 7  شماره 2

صفحات  133- 144

تاریخ انتشار 2019-11-01

با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023