Markov Chain Based Roaming Schemes for Honeypots

被引:0
作者
Shashikala Tapaswi
Adnan Mahboob
Ajay Shankar Shukla
Ishan Gupta
Pranshu Verma
Joydip Dhar
机构
[1] Atal Bihari Vajpayee-Indian Institute of Information Technology and Management,
来源
Wireless Personal Communications | 2014年 / 78卷
关键词
High interaction honeypot; Low interaction honeypot; Snort; Sebek; Honeyd; Markov chain; Roaming honeypots; IP shuffling;
D O I
暂无
中图分类号
学科分类号
摘要
The paper proposes a reactive roaming scheme for honeypots. The main aim of a honeypot is to capture the activities of the attacker. If the attacker detects honeypot on a system, its value drops. So, the concept of roaming honeypots is being proposed, to prevent the attacker from detecting the honeypot, which in turn increases the efficiency of honeypot and allows collecting rich data about activities of active attackers. The honeypot is shifted to another system which is most probable to be attacked within the network. The concept of Markov chain analysis is being used to detect the most probable system to be attacked based on the current status of the network. Further, using IP shuffling and services on/off concepts, honeypots roam on the network to the most probable system to be attacked using the threat score. Snort is used to capture data about the number of attacks on each of the nodes of the network and the data collected is then used as an input for Markov chain analysis to identify the most probable system where honeypot can be roamed/moved. The roaming scheme has been implemented for both high interaction honeypots and low interaction honeypots. The high interaction implementation helps in capturing in depth information on a shorter range of IP addresses, whereas the low interaction implementation is efficient in capturing information on a large range of IP addresses. The main advantage of this approach is that it predicts the frequency of attacks on the nodes of a particular network and takes a reactive step by starting the honeypot services on that particular node/system on the network.
引用
收藏
页码:995 / 1010
页数:15
相关论文
共 8 条
  • [1] Kimou KP(2010)An efficient analysis of honeypot data based on Markov chain Journal of Applied Sciences 10 196-202
  • [2] Barry B(2009)Fast detection and visualization of network attacks on parallel coordinates Computers & Security 28 276-288
  • [3] Babri M(undefined)undefined undefined undefined undefined-undefined
  • [4] Oumtanaga S(undefined)undefined undefined undefined undefined-undefined
  • [5] Kadjo TL(undefined)undefined undefined undefined undefined-undefined
  • [6] Choi H(undefined)undefined undefined undefined undefined-undefined
  • [7] Lee H(undefined)undefined undefined undefined undefined-undefined
  • [8] Kim H(undefined)undefined undefined undefined undefined-undefined