Scalable Honeypot Architecture for Identifying Malicious Network Activities

被引:8
作者
Sadasivam, Gokul Kannan [1 ]
Hota, Chittaranjan [1 ]
机构
[1] BITS, Dept Comp Sci & Informat Syst, Pilani Hyderabad Campus, Hyderabad, Andhra Pradesh, India
来源
2015 2ND INTERNATIONAL CONFERENCE ON EMERGING INFORMATION TECHNOLOGY AND ENGINEERING SOLUTIONS (EITES 2015) | 2015年
关键词
Honeypots; Server honeypots; Distributed honeypots; Dionaea; Glastopf; Kippo; J-Honeypot; HoneyD;
D O I
10.1109/EITES.2015.15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Server honeypots are computer systems that hide in a network capturing attack packets. As the name goes, server honeypots are installed in server machines running a set of services. Enterprises and government organisations deploy these honeypots to know the extent of attacks on their network. Since, most of the recent attacks are advanced persistent attacks there is much research work going on in building better peripheral security measures. In this paper, the authors have deployed several honeypots in a virtualized environment to gather traces of malicious activities. The network infrastructure is resilient and provides much information about hacker's activities. It is cost-effective and can be easily deployed in any organisation without specialized hardware.
引用
收藏
页码:27 / 31
页数:5
相关论文
共 9 条
[1]  
Baecher Paul, 2006, P 9 INT C REC ADV IN
[2]  
Chamotra S., 2011, INT C EM TRENDS NETW
[3]  
Gokul Kannan S, 2014, NAT C INT SYST COMP
[4]   Characterization and classification of malicious Web traffic [J].
Goseva-Popstojanova, Katerina ;
Anastasovski, Goce ;
Dimitrijevikj, Ana ;
Pantev, Risto ;
Miller, Brandon .
COMPUTERS & SECURITY, 2014, 42 :92-115
[5]  
Kumar Sanjeev, 2012, INT J COMPUTER THEOR
[6]  
Mai Y., 2004, INT C INF TECHN COD
[7]  
Mohammadzadeh Hamid, 2012, INT J INFORM ELECT E, V2
[8]  
Provos N, 2004, P 13 USENIX SEC S SA
[9]  
Valli Craig, 2012, CYBERSPACE SAFETY SE, V7672