scispace - formally typeset
Proceedings ArticleDOI

Honeypot: a supplemented active defense system for network security

TLDR
A honeypot is a supplemented active defense system for network security that traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system.
Abstract
A honeypot is a supplemented active defense system for network security. It traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. Integrated with other security solutions, a honeypot can solve many traditional dilemmas. We expatiate key components of data capture and data control in a honeypot, and give a classification for honeypots according to security goals and application goals. We review the technical progress and security contribution of production honeypots and research honeypots. We present typical honeypot solutions and predict the technical trends of integration, virtualization and distribution for future honeypots.

read more

Citations
More filters
Journal ArticleDOI

A new dynamic defense model based on active deception

TL;DR: Simulation results show that the DPIA can attract hacker agility and activity, lead abnormal traffic into it, distribute a large number of attack data, and ensure real network security.

A Study on Statistical Analysis on Security Attack Logs

TL;DR: The analysis process and methods based on statistical analysis techniques which provide us the internals about data set collected on Honeynet or on some other collection testbed are described and the suitable techniques to apply the intelligent algorithms on the collected data set are being presented.
Journal Article

A survey on the approaches in honeypot for implementing network security

TL;DR: The client and server honeypot approaches for the implementation of network security is discussed, which can initiatively lure hackers to attack the internet, take the record of the ways and means of their invasion, and then analyze and study them.
Journal ArticleDOI

Critical infrastructure protection system design based on SCOUT multitech seCurity system for intercOnnected space control groUnd staTions

TL;DR: The SCOUT project as mentioned in this paper is a multi-technology security system for inter-connected space control systems, which is based on misuse-based and anomaly-based intrusion detection system that allows for a prompt detection of ongoing attack.

A Rule Based Secure Network System - Prevents Log4jshell and SSH Intrusions

TL;DR: In this paper , the authors proposed a honeypot deployed in the firewall to detect SSH based attacks and alerts for any such potential attacks, which can be used to prevent such attacks in the future.
References
More filters
Proceedings ArticleDOI

Distributed denial of service attacks

TL;DR: It is found that under persistent denial of service attacks, class based queuing algorithms can guarantee bandwidth for certain classes of input flows.
Proceedings ArticleDOI

Implementing a distributed firewall

TL;DR: This paper presents the design and implementation of a distributed rewall using the KeyNote trust management system to specify, distribute, and resolve policy, and OpenBSD, an open source UNIX operating system.
Journal ArticleDOI

Temporal sequence learning and data reduction for anomaly detection

TL;DR: An approach that transforms temporal sequences of discrete, unordered observations into a metric space via a similarity measure that encodes intra-attribute dependencies and demonstrates that it can accurately differentiate the profiled user from alternative users when the available features encode sufficient information.
Proceedings ArticleDOI

Temporal sequence learning and data reduction for anomaly detection

TL;DR: An approach that transforms temporal sequences of discrete, unordered observations into a metric space via a similarity measure that encodes intra-attribute dependencies and demonstrates that it can accurately differentiate the profiled user from alternative users when the available features encode sufficient information.