Mitigating Threats in a Corporate Network with a Taintcheck-Enabled Honeypot

被引:1
作者
John, Samuel Ndueso [2 ]
Albert, Ola Ajibade [3 ]
Okokpujie, Kennedy [1 ]
Noma-Osaghae, Etinosa [1 ]
Osemwegie, Omoruyi [1 ]
Okereke, Chinonso [1 ]
机构
[1] Covenant Univ, Ota, Ogun State, Nigeria
[2] Nigerian Def Acad, Kaduna, Nigeria
[3] Univ Lagos, Lagos, Nigeria
来源
INFORMATION SCIENCE AND APPLICATIONS | 2020年 / 621卷
关键词
Corporate networks; Honeypot; Security; Threat; Taintcheck; Vulnerability; Zero-day;
D O I
10.1007/978-981-15-1465-4_8
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Conventional network security tools such as Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), anti-virus, antispyware and anti-malware integrated with firewalls generate a lot of false positives that make computer network system administration cumbersome. This paper proposes a novel mechanism comprising of taintcheck for dynamic analysis of buffer overflow attack using synthetic exploit and hybrid honeypot for scanning, detecting, identifying attackers and signature generation. In this framework, Noah's attack detection is used as a template. Upon testing, the practicality of the proposed framework was found to be more effective than other conventional network security tools as it effectively and comprehensively mitigates against threats and reported zero-day attacks with fewer false positives.
引用
收藏
页码:73 / 83
页数:11
相关论文
共 12 条
[1]  
Arefi MN, 2018, P 11 EUR WORKSH SYST, P3
[2]  
Bosman E, 2011, LECT NOTES COMPUT SC, V6961, P1, DOI 10.1007/978-3-642-23644-0_1
[3]  
John SN, 2014 WORLD C COMP SC, P319
[4]  
Kennedy O., 2019, International Journal of Electrical and Computer Engineering, V9, P359
[5]  
Marhusin MF, 2012, IMPROVING EFFECTIVEN
[6]  
Newsome J., 2005, NDSS, P3
[7]  
Okokpujie K., 2018, Telkomnika, V16, P2073, DOI [10.12928/TELKOMNIKA.v16i5.7326, DOI 10.12928/TELKOMNIKA.V16I5.7326]
[8]  
Okokpujie K. O., 2018, INT J COMMUNICATIONS, V8, P53
[9]  
Portokalidis G, 2007, TECHNICAL REPORT
[10]   Using malware for software-defined networking-based smart home security management through a taint checking approach [J].
Wang, Ping ;
Chao, Kuo-Ming ;
Lo, Chi-Chun ;
Lin, Wen-Hui ;
Lin, Hsiao-Chung ;
Chao, Wun-Jie .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016, 12 (08)