Anomaly-based intrusion monitoring using a dynamic honeypot

被引:0
|
作者
Hieb, J [1 ]
Graham, JH [1 ]
机构
[1] Univ Louisville, Dept Comp Engn & Comp Sci, Louisville, KY 40292 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A recent addition to the intrusion detection product line is a new technology called a honeypot. A honeypot provides an attacker with resources that appear to be actual production systems that are in reality decoy systems designed to be attacked. Observing interaction with the honeypot facilitates the observation and analysis of attacks and the detection of anomalies. This paper discusses the design of a dynamic honeypot. The dynamic honeypot configures, deploys, and maintains virtual honeypots on a network, using passive probing and dynamic templates to customize the virtual honeypots to the network and react differently depending on the source of the connection. This paper also discusses the design and implementation of a simple intrusion monitoring system using the dynamic honeypot. During initial testing an exploit attempt that was not detected by conventional intrusion detection was detected by the dynamic honeypot monitoring system.
引用
收藏
页码:184 / 189
页数:6
相关论文
共 50 条
  • [31] Adaptive anomaly-based intrusion detection system using genetic algorithm and profiling
    Alves Resende, Paulo Angelo
    Drummond, Andre Costa
    SECURITY AND PRIVACY, 2018, 1 (04):
  • [32] Anomaly-Based Intrusion Detection Model Using Deep Learning for IoT Networks
    Alsoufi, Muaadh A.
    Siraj, Maheyzah Md
    Ghaleb, Fuad A.
    Al-Razgan, Muna
    Al-Asaly, Mahfoudh Saeed
    Alfakih, Taha
    Saeed, Faisal
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 141 (01): : 823 - 845
  • [33] Incremental Anomaly-based Intrusion Detection System Using Limited Labeled Data
    Alaei, Parisa
    Noorbehbahani, Fakhroddin
    2017 3RD INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), 2017, : 178 - 184
  • [34] An Anomaly-Based Intrusion Detection System for IoT Networks Using Trust Factor
    Singh K.P.
    Kesswani N.
    SN Computer Science, 2022, 3 (2)
  • [35] Hybrid Intrusion Detection System using an Unsupervised method for Anomaly-based Detection
    Bhadauria, Saumya
    Mohanty, Tamanna
    2021 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (IEEE ANTS), 2021,
  • [36] Anomaly-based intrusion detection using mobility profiles of public transportation users
    Hall, J
    Barbeau, M
    Kranakis, E
    WIMOB'2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 2, PROCEEDINGS: MOBILE NETWORKING, 2005, : 17 - 24
  • [37] Anomaly-based Network Intrusion Detection Model using Deep Learning in Airports
    Sczari, Behrooz
    Moller, Dietmar P. F.
    Deutschmann, Andreas
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1725 - 1729
  • [38] Anomaly-Based Intrusion Detection of Protocol-Aware Jamming
    Lichtman, Marc
    Reed, Jeffrey H.
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 269 - 274
  • [39] A Genetic Clustering Technique for Anomaly-Based Intrusion Detection Systems
    Aissa, Naila Belhadj
    Guerroumi, Mohamed
    2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2015, : 87 - 92
  • [40] Anomaly-Based Intrusion Detection System for Ad hoc Networks
    Korba, Abdelaziz Amara
    Nafaa, Mehdi
    Ghamri-Doudane, Yacine
    2016 7TH INTERNATIONAL CONFERENCE ON THE NETWORK OF THE FUTURE (NOF), 2016,