Optimized Virtual Honeynet with Implementation of Host Machine as Honeywall

被引:0
作者
Gautam, Rohitkumar [1 ]
Kumar, Sanjeev [1 ]
Bhattacharya, Jhilik [2 ]
机构
[1] CDAC, Cyber Secur Technol Div, Mohali, India
[2] Thapar Univ, Dept Comp Sci & Engn, Patiala, Punjab, India
来源
2015 ANNUAL IEEE INDIA CONFERENCE (INDICON) | 2015年
关键词
Virtual Honeynet; Honeywall; Computer Security; Honeypot;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper proposes a methodology for the establishing a honeynet in which host machine work as honeywall and thus take advantage of underlying architecture on which they are deployed. Such setup help to minimize the CPU and RAM load for running extra virtual machine for CDROM Roo. In this implementation various types of honeypots continue to run in virtual environment using Virtual Box as in case of Generation III Virtual Honeynet. The implementation is specific to Linux based host machine having single network interface card deployed in distributed environment. Security of the host machine is of utmost important and hence special techniques are discussed to ensure its security and methods to mitigate security risk associated with host and virtual machines. Special techniques were implemented to enhance the data control and data capturing mechanisms to generate logs and securely forward to central data collection server.
引用
收藏
页数:6
相关论文
共 15 条
[1]  
Abbasi F.H., 2009, Telecommunication Networks and Applications Conference (ATNAC), 2009 Australasian, P1
[2]  
Johnny A., 2009, IMPLEMENTATION HIGH
[3]  
Li ZC, 2008, ADV INF SEC, V36, P25
[4]   Active versus Passive Malware Collection [J].
Lin, Ying-Dar ;
Lee, Chia-Yin ;
Wu, Yu-Sung ;
Ho, Pei-Hsiu ;
Wang, Fu-Yu ;
Tsai, Yi-Lang .
COMPUTER, 2014, 47 (04) :59-65
[5]  
Liu XW, 2011, COMM COM INF SC, V214, P93
[6]  
Mansoori M, 2012, INT ARAB J INF TECHN, V9, P436
[7]  
Memari N, 2014, IEEE REGION 10 SYMP, P496, DOI 10.1109/TENCONSpring.2014.6863084
[8]  
Mokube Iyatiti, 2007, Proceedings of the 45th ACM Southeast Conference. ACMSE 07, P321, DOI 10.1145/1233341.1233399
[9]  
Provos N., 2007, Virtual Honeypots: From Botnet Tracking to Intrusion Detection, V1st
[10]  
Singh Abhay Nath, 2011, Proceedings 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN 2011), P514, DOI 10.1109/ICSCCN.2011.6024606