Improved Self Adaptive Honeypots Capable of Detecting Rootkit Malware

被引:0
|
作者
Pauna, Adrian [1 ]
机构
[1] Mil Tech Acad, Fac Mil Elect Comp Sci Syst, Bucharest, Romania
关键词
honeypot; game theory; dynamic taint analysis; user mode linux;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The latest trends in the development of high interaction honeypots show that adaptive honeypots, which lure attackers by changing their behavior, are a feasible solution for gathering of as much information as possible about them. Adaptive Honeypot systems based on Game theory are in a development stage and the systems created until now are focused mostly on applying game-theoretic concepts for the configuration and reciprocal actions of high-interaction honeypots [1]. The paper presents a tested proof of concept system that integrates dynamic taint analysis with an existing adaptive honeypot in order to detect the rootkit malware that the attacker installs.
引用
收藏
页码:281 / 284
页数:4
相关论文
共 50 条
  • [1] Detecting Malware and Rootkit via Memory Forensics
    Hua, Qiang
    Zhang, Yang
    2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND MECHANICAL AUTOMATION (CSMA), 2015, : 92 - 96
  • [2] A New Windows Malware and Rootkit Identifying and Detecting Software Based on System Routine Redirecting
    Lu, Yu-xun
    Liu, Duo
    Chen, Xu-dong
    Xu, Hua-cong
    INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 30 - 34
  • [3] On the rewards of self-adaptive IoT honeypots
    Pauna, Adrian
    Bica, Ion
    Pop, Florin
    Castiglione, Aniello
    ANNALS OF TELECOMMUNICATIONS, 2019, 74 (7-8) : 501 - 515
  • [4] On the rewards of self-adaptive IoT honeypots
    Adrian Pauna
    Ion Bica
    Florin Pop
    Aniello Castiglione
    Annals of Telecommunications, 2019, 74 : 501 - 515
  • [5] A Comparison of an Adaptive Self-Guarded Honeypot with Conventional Honeypots
    Touch, Sereysethy
    Colin, Jean-Noel
    APPLIED SCIENCES-BASEL, 2022, 12 (10):
  • [6] Self Adaptive High Interaction Honeypots Driven by Game Theory
    Wagener, Gerard
    State, Radu
    Dulaunoy, Alexandre
    Engel, Thomas
    STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, PROCEEDINGS, 2009, 5873 : 741 - 755
  • [7] An Improved Method of Detecting Macro Malware on an Imbalanced Dataset
    Mimura, Mamoru
    IEEE ACCESS, 2020, 8 : 204709 - 204717
  • [8] Detecting android malware using an improved filter based technique in embedded software
    Priya, Varna D.
    Visalakshi, P.
    MICROPROCESSORS AND MICROSYSTEMS, 2020, 76 (76)
  • [9] Detecting and Classifying Self-Deleting Windows Malware Using Prefetch Files
    Duby, Adam
    Taylor, Teryl
    Bloom, Gedare
    Zhuang, Yanyan
    2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2022, : 745 - 751
  • [10] SELF-ADAPTIVE COMPLIANT GRIPPERS CAPABLE OF PINCH PRESHAPING
    Birglen, Lionel
    Herbecq, Francois
    PROCEEDINGS OF THE ASME INTERNATIONAL DESIGN ENGINEERING TECHNICAL CONFERENCES AND COMPUTERS AND INFORMATION IN ENGINEERING CONFERENCE, VOL 7, PTS A AND B, 2010, : 249 - 257