Anomaly-based intrusion monitoring using a dynamic honeypot

被引:0
|
作者
Hieb, J [1 ]
Graham, JH [1 ]
机构
[1] Univ Louisville, Dept Comp Engn & Comp Sci, Louisville, KY 40292 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A recent addition to the intrusion detection product line is a new technology called a honeypot. A honeypot provides an attacker with resources that appear to be actual production systems that are in reality decoy systems designed to be attacked. Observing interaction with the honeypot facilitates the observation and analysis of attacks and the detection of anomalies. This paper discusses the design of a dynamic honeypot. The dynamic honeypot configures, deploys, and maintains virtual honeypots on a network, using passive probing and dynamic templates to customize the virtual honeypots to the network and react differently depending on the source of the connection. This paper also discusses the design and implementation of a simple intrusion monitoring system using the dynamic honeypot. During initial testing an exploit attempt that was not detected by conventional intrusion detection was detected by the dynamic honeypot monitoring system.
引用
收藏
页码:184 / 189
页数:6
相关论文
共 50 条
  • [21] An Adaptive Anomaly-based Intrusion Prevention System for Databases
    Emrick, Eric S.
    Hu, Yi
    2014 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), 2014, : 3382 - 3389
  • [22] Anomaly-based Intrusion Detection System for smart lighting
    Lara, Agustin
    Estepa, Antonio
    Estepa, Rafael
    Diaz-Verdejo, Jesus E.
    Mayor, Vicente
    INTERNET OF THINGS, 2024, 28
  • [23] SCADA Networks Anomaly-based Intrusion Detection System
    Almehmadi, Abdulaziz
    11TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2018), 2018,
  • [24] Anomaly-Based Intrusion Detection Algorithms for Wireless Networks
    Fragkiadakis, Alexandros G.
    Siris, Vasilios A.
    Petroulakis, Nikolaos
    WIRED-WIRELESS INTERNET COMMUNICATIONS, PROCEEDINGS, 2010, 6074 : 192 - 203
  • [25] Determining the operational limits of an anomaly-based intrusion detector
    Tan, KMC
    Maxion, RA
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2003, 21 (01) : 96 - 110
  • [26] Feature Selection for Effective Anomaly-Based Intrusion Detection
    Ghali, Noreen I.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 285 - 289
  • [27] Anomaly-based intrusion detection system for IoT application
    Bhavsar M.
    Roy K.
    Kelly J.
    Olusola O.
    Discover Internet of Things, 2023, 3 (01):
  • [28] Anomaly-based Network Intrusion Detection using Ensemble Machine Learning Approach
    Das, Abhijit
    Pramod
    Sunitha, B. S.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (02) : 635 - 645
  • [29] Accuracy improvement of anomaly-based intrusion detection system using Taguchi method
    Konno, T
    Tateoka, M
    2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 90 - 93
  • [30] Personal anomaly-based intrusion detection smart card using behavioural analysis
    Rossudowski, A. M.
    Venter, H. S.
    Eloff, J. H. P.
    NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 217 - +