A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks

被引:60
作者
Artail, Hassan
Safa, Haidar
Sraj, Malek
Kuwatly, Iyad
Al-Masri, Zaid
机构
[1] Amer Univ Beirut, Dept Elect & Comp Engn, Beirut 1107 2020, Lebanon
[2] Amer Univ Beirut, Dept Comp Sci, Beirut 1107 2020, Lebanon
关键词
intrusion detection; network security; computer security; organizational networks; honeypots; snort;
D O I
10.1016/j.cose.2006.02.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a hybrid and adaptable honeypot-based approach that improves the currently deployed IDSs for protecting networks from intruders. The main idea is to deploy low-interaction honeypots that act as emulators of services and operating systems and have them direct malicious traffic to high-interaction honeypots, where hackers engage with real services. The setup permits for recording and analyzing the intruder's activities and using the results to take administrative actions toward protecting the network. The paper describes the basic components, design, operation, implementation and deployment of the proposed approach, and presents several performance and load testing scenarios. Implementation and performance plus load testing show the adaptability of the proposed approach and its effectiveness in reducing the probability of attacks on production computers. (C) 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:274 / 288
页数:15
相关论文
共 34 条
[1]  
Anderson J.P., 1980, Computer security threat monitoring and surveillance
[2]  
[Anonymous], ACM SIGOPS OPERATING
[3]  
[Anonymous], 2002, Host Discovery with NMAP
[4]  
BALASUBRAMANIYA.J, 1998, P COMP SEC APPL C
[5]  
Bauer D. S., 1988, Proceedings of the Computer Networking Symposium (Cat. No.88CH2547-8), P98, DOI 10.1109/CNS.1988.4983
[6]  
Bernardes MC, 2000, INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, P158, DOI 10.1109/PDSE.2000.847862
[7]  
Budiarto R., 2004, Proceedings. 2004 International Conference on Information and Communication Technologies: From Theory to Applications (IEEE Cat. No.04EX852), P565, DOI 10.1109/ICTTA.2004.1307887
[8]   Honeypots: Practical means to validate malicious fault assumptions - Practical experience report [J].
Dacier, M ;
Pouget, F ;
Debar, H .
10TH IEEE PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2004, :383-388
[9]   CIDS: An agent-based intrusion detection system [J].
Dasgupta, D ;
Gonzalez, F ;
Yallapu, K ;
Gomez, J ;
Yarramsettii, R .
COMPUTERS & SECURITY, 2005, 24 (05) :387-398
[10]  
Denning D. E., 1986, Proceedings of the 1986 IEEE Symposium on Security and Privacy (Cat. No.86CH2292-1), P118