Anomaly-based intrusion monitoring using a dynamic honeypot

被引:0
|
作者
Hieb, J [1 ]
Graham, JH [1 ]
机构
[1] Univ Louisville, Dept Comp Engn & Comp Sci, Louisville, KY 40292 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A recent addition to the intrusion detection product line is a new technology called a honeypot. A honeypot provides an attacker with resources that appear to be actual production systems that are in reality decoy systems designed to be attacked. Observing interaction with the honeypot facilitates the observation and analysis of attacks and the detection of anomalies. This paper discusses the design of a dynamic honeypot. The dynamic honeypot configures, deploys, and maintains virtual honeypots on a network, using passive probing and dynamic templates to customize the virtual honeypots to the network and react differently depending on the source of the connection. This paper also discusses the design and implementation of a simple intrusion monitoring system using the dynamic honeypot. During initial testing an exploit attempt that was not detected by conventional intrusion detection was detected by the dynamic honeypot monitoring system.
引用
收藏
页码:184 / 189
页数:6
相关论文
共 50 条
  • [41] Anomaly-based network intrusion detection: Techniques, systems and challenges
    Garcia-Teodoro, P.
    Diaz-Verdejo, J.
    Macia-Fernandez, G.
    Vazquez, E.
    COMPUTERS & SECURITY, 2009, 28 (1-2) : 18 - 28
  • [42] Measuring normality in HTTP traffic for anomaly-based intrusion detection
    Estévez-Tapiador, JM
    García-Teodoro, P
    Díaz-Verdejo, JE
    COMPUTER NETWORKS, 2004, 45 (02) : 175 - 193
  • [43] An Initial Investigation on Sliding Windows for Anomaly-Based Intrusion Detection
    Zoppi, Tommaso
    Ceccarelli, Andrea
    Bondavalli, Andrea
    2019 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2019), 2019, : 99 - 104
  • [44] Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments
    Ghafouri, Amin
    Abbas, Waseem
    Laszka, Aron
    Vorobeychik, Yevgeniy
    Koutsoukos, Xenofon
    DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 415 - 434
  • [45] Anomaly-Based Intrusion Detection for Detecting Blackhole Attack Mitigataion
    Abdelhamid, Ashraf
    Elsayed, Mahmoud Said
    Aslan, Heba K.
    Azer, Marianne A.
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [46] Learning Mechanisms for Anomaly-Based Intrusion Detection: Updated Review
    El-Alfy, El-Sayed M.
    Al-Utaibi, Khaled A.
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 1273 - 1281
  • [47] Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques
    Kumar, Neeraj
    Kumar, Upendra
    PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 : 262 - 269
  • [48] Design of Anomaly-Based Intrusion Detection System Using Fog Computing for IoT Network
    Kumar, Prabhat
    Gupta, Govind P.
    Tripathi, Rakesh
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2021, 55 (02) : 137 - 147
  • [49] A Hybrid Model for Anomaly-based Intrusion Detection in SCADA Networks
    Ullah, Imtiaz
    Mahmoud, Qusay H.
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 2160 - 2167
  • [50] Applications of Clustering Methods to Anomaly-Based Intrusion Detection Systems
    Nikolova, Evgeniya
    Jecheva, Veselina
    2015 8TH INTERNATIONAL CONFERENCE ON DATABASE THEORY AND APPLICATION (DTA), 2015, : 37 - 41