Defending Polymorphic Worms in Computer Network using Honeypot

被引:0
作者
Goswami, R. T. [1 ,2 ]
Mondal, Avijit [1 ,2 ]
Mishra, Bimal Kumar
Mahanti, N. C.
机构
[1] Birla Inst Technol Extens Ctr, Dept Comp Sci, Kolkata 700107, India
[2] Birla Inst Technol, Dept Appl Math, Ranchi 835, Bihar, India
关键词
Polymorphic worm; Honeypot; Honeynet; Sticky honeypot; Cloud computing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Polymorphic worms are a major threat to internet infrastructure security. In this mechanism we are using gatetranslator, double honeypot, sticky honeypot, internal translator and antivirus of Cloud AV, which attracts polymorphic worms. We are proposing an algorithm to detect and remove polymorphic worms and innocuous traffic related packets.
引用
收藏
页码:63 / 65
页数:3
相关论文
共 50 条
[21]   Toward machine intelligence that learns to fingerprint polymorphic worms in IoT [J].
Wang, Fangwei ;
Yang, Shaojie ;
Wang, Changguang ;
Li, Qingru ;
Babaagba, Kehinde O. ;
Tan, Zhiyuan .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (10) :7058-7078
[22]   Autonomous Hybrid Honeypot as the Future of Distributed Computer Systems Security [J].
Fanfara, Peter ;
Dufala, Marek ;
Radusovsky, Jan .
ACTA POLYTECHNICA HUNGARICA, 2013, 10 (06) :25-42
[23]   SCADA security using SSH honeypot [J].
Belqruch, Amine ;
Maach, Abdelilah .
PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEMS & SECURITY (NISS19), 2019,
[24]   Efficient Hybrid Technique for Detecting Zero-Day Polymorphic Worms [J].
Kaur, Ratinder ;
Singh, Maninder .
SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, :95-100
[25]   Application of Virtual Honeypot on the Mining Enterprise Network Security [J].
Liu, Haibo .
2012 WORLD AUTOMATION CONGRESS (WAC), 2012,
[26]   Dynamic & Hybrid Honeypot Model for Scalable Network Monitoring [J].
Chawda, Kartik ;
Patel, Ankit D. .
2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
[27]   An experimental study on cloud honeypot and data visualization using ELK stack [J].
Ali, Fakariah Hani Mohd ;
Salleh, Muhammad Fadhli Mohd ;
Zulkipli, Nurul Huda Nik .
INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2021, 12 :1117-1132
[28]   Confirmation of wormhole attack in MANETs using honeypot [J].
Tiruvakadu, Divya Sai Keerthi ;
Pallapa, Venkataram .
COMPUTERS & SECURITY, 2018, 76 :32-49
[29]   Graph based signature classes for detecting polymorphic worms via content analysis [J].
Bayoglu, Burak ;
Sogukpinar, Ibrahim .
COMPUTER NETWORKS, 2012, 56 (02) :832-844
[30]   Mitigating Threats in a Corporate Network with a Taintcheck-Enabled Honeypot [J].
John, Samuel Ndueso ;
Albert, Ola Ajibade ;
Okokpujie, Kennedy ;
Noma-Osaghae, Etinosa ;
Osemwegie, Omoruyi ;
Okereke, Chinonso .
INFORMATION SCIENCE AND APPLICATIONS, 2020, 621 :73-83