A Smart Agent Design for Cyber Security Based on Honeypot and Machine Learning

被引:14
作者
El Kamel, Nadiya [1 ]
Eddabbah, Mohamed [2 ]
Lmoumen, Youssef [1 ]
Touahni, Raja [1 ]
机构
[1] Univ Ibn Tofail, Fac Sci, Dept Phys, Lab Syst Telecommun & Ingn Decis LASTID, Kenitra, Morocco
[2] Abdelmalek Essaadi Univ Tangier, LABTIC Lab ENSA, Tangier, Morocco
关键词
Cybersecurity - Network security - Computer crime;
D O I
10.1155/2020/8865474
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of Internet and social media contributes to multiplying the data produced on the Internet and the connected nodes, but the default installation and the configuration of variety of software systems represent some security holes and shortcomings, while the majority of Internet users have not really set up safety awareness, leading to huge security risks. With the development of network attack techniques, every host on the Internet has become the target of attacks. Therefore, the network information security cannot be ignored as a problem. To deal with 0-day and future attacks, the honeypot technique can be used not only passively as an information system, but also to reinforce the traditional defense systems against future attacks. In this paper, we present an introduction of machine learning and honeypot systems, and based on these technologies, we design a smart agent for cyber-attack prevention and prediction.
引用
收藏
页数:9
相关论文
共 30 条
[1]  
[Anonymous], 2017, MALW NUMB
[2]  
[Anonymous], 2013, International Journal
[3]  
[Anonymous], 2003, Honeypots: tracking hackers
[4]  
[Anonymous], 2010, PAMI, DOI DOI 10.1109/TPAMI.2010.1282-S2.0-78149282850
[5]  
[Anonymous], 2012, LINEAR REGRESSION AN
[6]   Improving adaptive honeypot functionality with efficient reinforcement learning parameters for automated malware [J].
Dowling, Seamus ;
Schukat, Michael ;
Barrett, Enda .
Journal of Cyber Security Technology, 2018, 2 (02) :75-91
[7]  
Eddabbah M., 2019, INT J INTELL ENG INF, V6, P293, DOI [10.1504/ijie.2019.10022696, DOI 10.1504/IJIE.2019.10022696]
[8]  
Feng G., 2014, DESIGN LINKAGE SECUR
[9]  
Fraunholz D., 2017, European Conference on Cyber Warfare and Security, P120
[10]  
Hssina B., 2014, International Journal of Advanced Computer Science and Applications, Special Issue on Advances in Vehicular Ad Hoc Networking and Applications, vol, V4, n, P13, DOI DOI 10.14569/SPECIALISSUE.2014.040203