Implementation of Honey Pots for Dynamic Networks with Adaptability

N. Muni Sankar, E. Prakash Babu .

Abstract


Since honey pots first appeared as an advanced network security concept they suffer from poor deployment and maintenance strategies. State-of-the-Art deployment is a manual process in which the honey pot needs to be configured and maintained by a network administrator. In this paper we present a method for a dynamic honey pot configuration, deployment and maintenance strategy based on machine learning techniques. Our method features an identification mechanism for machines and devices in a network. These entities are analyzed and clustered. Based on the clusters, honey pots are intelligently deployed in the network. The proposed method needs no configuration and maintenance and is therefore a major advantage for the honey pot technology in modern network security.

Full Text:

PDF

References


L. Spitzner, Dynamic Honeypots.

C. Stoll, The cuckoo's egg: Tracking a spy through the maze of computer espionage, Pocket Books, New York, 1990.

D. Sysman, I. Sher, G. Evron, Breaking Honeypots for Fun and Profit,Black hat USA (2015).

G. Wagener, R. State, A. Dulaunoy, T. Engel, Heliza: talking dirty to the attackers, Computer Virology (2010).

G. Wagener, R. State, T. Engel, A. Dulaunoy, Adaptive and Self-Configurable Honeypots, 12th IFIP/IEEE International Symposium on Integrated Network Management (2011) 345–352.

A. Pauna, I. Bica, RASSH- Reinforced Adaptive SSH Honeypot, 10th International Conference on Communications (2014).

C. Leita, K. Mermoud, M. Dacier, ScriptGen: an automated script generation tool for honeyd, 21st Annual Computer Security Applications Conference (2005

V. Chowdhary, A. Tongaonkar, T.-c. Chiueh, Towards Automatic Learning of Valid Services for Honeypots, 1st International Conference Distributed Computing and Internet Technology 469.

C. Hecker, K.L. Nance, B. Hay, Dynamic Honeypot Construction, 10thColloqium for Inforation Systems Security Education (2006) 95–102.

W.Z.A. Zakaria, L.M. Kiah, A Review on Artificial Intelligence Techniques for Developing Intelligent Honeypot, Kuala Lumpur, 2012.

W.Z.A. Zakaria, L.M. Kiah, A review of dynamic and Intelligent honeypots, ScienceAsia 39S (2013).

F. Vaskovich, The Art of Port Scanning, Phrack Magazine 7 (1997).

N. Provos, A Virtual Honeypot Framework, USENIX Security Symposium 2004.


Refbacks

  • There are currently no refbacks.




© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.