Autonomous Hybrid Honeypot as the Future of Distributed Computer Systems Security

被引:0
作者
Fanfara, Peter [1 ]
Dufala, Marek [1 ]
Radusovsky, Jan [1 ]
机构
[1] Tech Univ Kosice, Fac Elect Engn & Informat, Dept Comp & Informat, Kosice 04001, Slovakia
关键词
Honeypot; Hybrid Honeypot; Intrusion; Intrusion Detection System; Types of Honeypots;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Computer security presents one of the fastest-evolving segments in the Information Technologies (IT) area. The traditional system security approach is slightly focused on defence but more attention has been drawn to aggressive forms of defence against potential attackers and intruders. The advanced decoy based technology called Honeypot is a similar form of protection against intrusion. The paper is focused mainly on the proposal of the autonomous hybrid Honeypot and its features in cooperation with the Intrusion Detection System (IDS). The weakness of the detection mechanism is a major IDS shortcoming that can be minimized by using the hybrid Honeypot technology. The proposed architecture can be used as a solution for a rapid increase a security with the autonomous behaviour model in a distributed computer system.
引用
收藏
页码:25 / 42
页数:18
相关论文
共 16 条
[1]  
Baumann Reto., 2002, White paper: Honeypots
[2]  
CHANDRAN R., 2003, SIMULATING NETWORK H
[3]  
Jakubco P., 2011, EL ENG INF 2 P FAC E, P284
[4]  
Karthik S., 2004, J COMPUTING SCI COLL
[5]  
Lyon F. G., 2009, NMAP NETWORK SCANNIN
[6]   Defending yourself: The role of intrusion detection systems [J].
McHugh, J ;
Christie, A ;
Allen, J .
IEEE SOFTWARE, 2000, 17 (05) :42-+
[7]  
Provos Niels., 2008, DEV HONEYD VIRTUAL H
[8]  
Spitzner L., 2001, The Value of Honeypots, Part One: Definitions and Values of Hon-eypots
[9]  
Spitzner L., 2003, Honeypots: Tracking Hackers, V1
[10]  
Szabo Cs., 2008, ACTA ELECTROTECHNICA, V8, P56