Proceedings ArticleDOI
Honeypot: a supplemented active defense system for network security
Feng Zhang,Shijie Zhou,Zhiguang Qin,Jinde Liu +3 more
- pp 231-235
TLDR
A honeypot is a supplemented active defense system for network security that traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system.Abstract:
A honeypot is a supplemented active defense system for network security. It traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. Integrated with other security solutions, a honeypot can solve many traditional dilemmas. We expatiate key components of data capture and data control in a honeypot, and give a classification for honeypots according to security goals and application goals. We review the technical progress and security contribution of production honeypots and research honeypots. We present typical honeypot solutions and predict the technical trends of integration, virtualization and distribution for future honeypots.read more
Citations
More filters
Journal ArticleDOI
A new dynamic defense model based on active deception
TL;DR: Simulation results show that the DPIA can attract hacker agility and activity, lead abnormal traffic into it, distribute a large number of attack data, and ensure real network security.
A Study on Statistical Analysis on Security Attack Logs
Rajesh Kumar,Tajinder Kaur +1 more
TL;DR: The analysis process and methods based on statistical analysis techniques which provide us the internals about data set collected on Honeynet or on some other collection testbed are described and the suitable techniques to apply the intelligent algorithms on the collected data set are being presented.
Journal Article
A survey on the approaches in honeypot for implementing network security
Niharika Srivastava,Ved Prakash +1 more
TL;DR: The client and server honeypot approaches for the implementation of network security is discussed, which can initiatively lure hackers to attack the internet, take the record of the ways and means of their invasion, and then analyze and study them.
Journal ArticleDOI
Critical infrastructure protection system design based on SCOUT multitech seCurity system for intercOnnected space control groUnd staTions
Alessandro Cantelli-Forti,Amerigo Capria,Anna Lisa Saverino,Fabrizio Berizzi,Davide Adami,Christian Callegari +5 more
TL;DR: The SCOUT project as mentioned in this paper is a multi-technology security system for inter-connected space control systems, which is based on misuse-based and anomaly-based intrusion detection system that allows for a prompt detection of ongoing attack.
A Rule Based Secure Network System - Prevents Log4jshell and SSH Intrusions
Moradian Arsalan,G. Sujatha +1 more
TL;DR: In this paper , the authors proposed a honeypot deployed in the firewall to detect SSH based attacks and alerts for any such potential attacks, which can be used to prevent such attacks in the future.
References
More filters
Proceedings ArticleDOI
Distributed denial of service attacks
TL;DR: It is found that under persistent denial of service attacks, class based queuing algorithms can guarantee bandwidth for certain classes of input flows.
Proceedings ArticleDOI
Implementing a distributed firewall
TL;DR: This paper presents the design and implementation of a distributed rewall using the KeyNote trust management system to specify, distribute, and resolve policy, and OpenBSD, an open source UNIX operating system.
Proceedings ArticleDOI
Anomaly Detection over Noisy Data using Learned Probability Distributions
Journal ArticleDOI
Temporal sequence learning and data reduction for anomaly detection
Terran Lane,Carla E. Brodley +1 more
TL;DR: An approach that transforms temporal sequences of discrete, unordered observations into a metric space via a similarity measure that encodes intra-attribute dependencies and demonstrates that it can accurately differentiate the profiled user from alternative users when the available features encode sufficient information.
Proceedings ArticleDOI
Temporal sequence learning and data reduction for anomaly detection
Terran Lane,Carla E. Brodley +1 more
TL;DR: An approach that transforms temporal sequences of discrete, unordered observations into a metric space via a similarity measure that encodes intra-attribute dependencies and demonstrates that it can accurately differentiate the profiled user from alternative users when the available features encode sufficient information.