scispace - formally typeset
Proceedings ArticleDOI

Honeypot: a supplemented active defense system for network security

Reads0
Chats0
TLDR
A honeypot is a supplemented active defense system for network security that traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system.
Abstract
A honeypot is a supplemented active defense system for network security. It traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. Integrated with other security solutions, a honeypot can solve many traditional dilemmas. We expatiate key components of data capture and data control in a honeypot, and give a classification for honeypots according to security goals and application goals. We review the technical progress and security contribution of production honeypots and research honeypots. We present typical honeypot solutions and predict the technical trends of integration, virtualization and distribution for future honeypots.

read more

Citations
More filters

Adaptive Information Security in Body Sensor-Actuator Networks

TL;DR: This paper presents an adaptive information security scheme for BSANs that uses honeypots to measure the current threat context, by interacting with the adversaries trying to undermine user safety.
Proceedings ArticleDOI

Research and Implementation of a Network Secure System Based on Honeypots

TL;DR: Simulation experiments indicate that comparing to the traditional secure system based on honeypot, NSSH can make network’s security performance to a high level and N SSH has important impact on forecast and monitor attack activities.
Proceedings ArticleDOI

Analysis of attack and attackers on VoIP Honeypot environment

TL;DR: A low interaction honeypot environment was implemented to identify the behaviors of the attackers and the services most frequently used and provides an in-depth analysis about both attacks and attackers profile, their tactics and purposes.

Scalable Honeypot Monitoring and Analytics

Mariia Kovtun
TL;DR: This thesis proposes a scalable monitoring and analytics system that can be implemented using only open-source software and does not noticeably impact the performance of individual honeypots or the scalability of the overall honeypot system.
References
More filters
Proceedings ArticleDOI

Distributed denial of service attacks

TL;DR: It is found that under persistent denial of service attacks, class based queuing algorithms can guarantee bandwidth for certain classes of input flows.
Proceedings ArticleDOI

Implementing a distributed firewall

TL;DR: This paper presents the design and implementation of a distributed rewall using the KeyNote trust management system to specify, distribute, and resolve policy, and OpenBSD, an open source UNIX operating system.
Journal ArticleDOI

Temporal sequence learning and data reduction for anomaly detection

TL;DR: An approach that transforms temporal sequences of discrete, unordered observations into a metric space via a similarity measure that encodes intra-attribute dependencies and demonstrates that it can accurately differentiate the profiled user from alternative users when the available features encode sufficient information.
Proceedings ArticleDOI

Temporal sequence learning and data reduction for anomaly detection

TL;DR: An approach that transforms temporal sequences of discrete, unordered observations into a metric space via a similarity measure that encodes intra-attribute dependencies and demonstrates that it can accurately differentiate the profiled user from alternative users when the available features encode sufficient information.