Enabling an Anatomic View to Investigate Honeypot Systems: A Survey

被引:48
作者
Fan, Wenjun [1 ]
Du, Zhihui [2 ]
Fernandez, David [3 ]
Villagra, Victor A. [3 ]
机构
[1] Univ Kent, Sch Comp, Canterbury CT2 7NZ, Kent, England
[2] Tsinghua Univ, Dept Comp Sci & Technol, Tsinghua Natl Lab Informat Sci & Technol, Beijing 100084, Peoples R China
[3] Univ Politecn Madrid, Dept Telemat Engn, E-28040 Madrid, Spain
来源
IEEE SYSTEMS JOURNAL | 2018年 / 12卷 / 04期
基金
中国国家自然科学基金;
关键词
Computer security; honeypots; intrusion detection; network security; virtualization; SECURE;
D O I
10.1109/JSYST.2017.2762161
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A honeypot is a type of security facility deliberately created to be probed, attacked, and compromised. It is often used for protecting production systems by detecting and deflecting unauthorized accesses. It is also useful for investigating the behavior of attackers, and in particular, unknown attacks. For the past 17 years plenty of effort has been invested in the research and development of honeypot techniques, and they have evolved to be an increasingly powerful means of defending against the creations of the blackhat community. In this paper, by studying a wide set of honeypots, the two essential elements of honeypots-the decoy and the captor-are captured and presented, together with two abstract organizational forms-independent and cooperative-where these two elements can be integrated. A novel decoy and captor (D-C) based taxonomy is proposed for the purpose of studying and classifying the various honeypot techniques. An extensive set of independent and cooperative honeypot projects and research that cover these techniques is surveyed under the taxonomy framework. Furthermore, two subsets of features from the taxonomy are identified, which can greatly influence the honeypot performances. These two subsets of features are applied to a number of typical independent and cooperative honeypots separately in order to validate the taxonomy and predict the honeypot development trends.
引用
收藏
页码:3906 / 3919
页数:14
相关论文
共 93 条
[1]  
Abbasi F.H., 2009, Telecommunication Networks and Applications Conference (ATNAC), 2009 Australasian, P1
[2]   Internet attacks monitoring with dynamic connection redirection mechanisms [J].
Alata, Eric ;
Alberdi, Ion ;
Nicomette, Vincent ;
Owezarski, Philippe ;
Kaaniche, Mohamed .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2008, 4 (02) :127-136
[3]  
Anagnostakis K.G., 2005, P 14 USENIX SECURITY, P9
[4]  
[Anonymous], 2006, ACM SIGOPS OPER SYST, DOI DOI 10.1145/1218063.1217938
[5]  
[Anonymous], 2011, DIONAEA CATCHED BUGS
[6]  
[Anonymous], 2002, P 9 ACM C COMP COMM
[7]  
[Anonymous], 2003, KNOW YOUR ENEMY SEBE
[8]  
[Anonymous], 2005, KNOW YOUR ENEMY HONE
[9]  
[Anonymous], 2005, KNOW YOUR ENEMY GENI
[10]  
[Anonymous], 2006, KNOW YOUR ENEMY HONE