Proceedings ArticleDOI
Honeypot: a supplemented active defense system for network security
Feng Zhang,Shijie Zhou,Zhiguang Qin,Jinde Liu +3 more
- pp 231-235
Reads0
Chats0
TLDR
A honeypot is a supplemented active defense system for network security that traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system.Abstract:
A honeypot is a supplemented active defense system for network security. It traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. Integrated with other security solutions, a honeypot can solve many traditional dilemmas. We expatiate key components of data capture and data control in a honeypot, and give a classification for honeypots according to security goals and application goals. We review the technical progress and security contribution of production honeypots and research honeypots. We present typical honeypot solutions and predict the technical trends of integration, virtualization and distribution for future honeypots.read more
Citations
More filters
Adaptive Information Security in Body Sensor-Actuator Networks
TL;DR: This paper presents an adaptive information security scheme for BSANs that uses honeypots to measure the current threat context, by interacting with the adversaries trying to undermine user safety.
Proceedings ArticleDOI
Research and Implementation of a Network Secure System Based on Honeypots
Bingqing Luo,Zhixin Sun +1 more
TL;DR: Simulation experiments indicate that comparing to the traditional secure system based on honeypot, NSSH can make network’s security performance to a high level and N SSH has important impact on forecast and monitor attack activities.
Proceedings ArticleDOI
Analysis of attack and attackers on VoIP Honeypot environment
H. Hakan Kilinc,Omer Faruk Acar +1 more
TL;DR: A low interaction honeypot environment was implemented to identify the behaviors of the attackers and the services most frequently used and provides an in-depth analysis about both attacks and attackers profile, their tactics and purposes.
Scalable Honeypot Monitoring and Analytics
TL;DR: This thesis proposes a scalable monitoring and analytics system that can be implemented using only open-source software and does not noticeably impact the performance of individual honeypots or the scalability of the overall honeypot system.
References
More filters
Proceedings ArticleDOI
Distributed denial of service attacks
TL;DR: It is found that under persistent denial of service attacks, class based queuing algorithms can guarantee bandwidth for certain classes of input flows.
Proceedings ArticleDOI
Implementing a distributed firewall
TL;DR: This paper presents the design and implementation of a distributed rewall using the KeyNote trust management system to specify, distribute, and resolve policy, and OpenBSD, an open source UNIX operating system.
Proceedings ArticleDOI
Anomaly Detection over Noisy Data using Learned Probability Distributions
Journal ArticleDOI
Temporal sequence learning and data reduction for anomaly detection
Terran Lane,Carla E. Brodley +1 more
TL;DR: An approach that transforms temporal sequences of discrete, unordered observations into a metric space via a similarity measure that encodes intra-attribute dependencies and demonstrates that it can accurately differentiate the profiled user from alternative users when the available features encode sufficient information.
Proceedings ArticleDOI
Temporal sequence learning and data reduction for anomaly detection
Terran Lane,Carla E. Brodley +1 more
TL;DR: An approach that transforms temporal sequences of discrete, unordered observations into a metric space via a similarity measure that encodes intra-attribute dependencies and demonstrates that it can accurately differentiate the profiled user from alternative users when the available features encode sufficient information.