Defending Polymorphic Worms in Computer Network using Honeypot

被引:0
作者
Goswami, R. T. [1 ,2 ]
Mondal, Avijit [1 ,2 ]
Mishra, Bimal Kumar
Mahanti, N. C.
机构
[1] Birla Inst Technol Extens Ctr, Dept Comp Sci, Kolkata 700107, India
[2] Birla Inst Technol, Dept Appl Math, Ranchi 835, Bihar, India
关键词
Polymorphic worm; Honeypot; Honeynet; Sticky honeypot; Cloud computing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Polymorphic worms are a major threat to internet infrastructure security. In this mechanism we are using gatetranslator, double honeypot, sticky honeypot, internal translator and antivirus of Cloud AV, which attracts polymorphic worms. We are proposing an algorithm to detect and remove polymorphic worms and innocuous traffic related packets.
引用
收藏
页码:63 / 65
页数:3
相关论文
共 50 条
[41]   Automated signature generation algorithm for polymorphic worms based on improved TF-IDF [J].
Wang F. ;
Yang S. ;
Zhao D. ;
Wang C. .
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2020, 48 (02) :79-84
[42]   Automatic Signature Generation for Polymorphic Worms by Combination ofToken Extraction and Sequence Alignment Approaches [J].
Eskandari, Razieh ;
Shajari, Mehdi ;
Asadi, Asadallah .
2015 7TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2015,
[43]   The Performance Analysis of Honeypot Based Intrusion Detection System for Wireless Network [J].
Agrawal N. ;
Tapaswi S. .
International Journal of Wireless Information Networks, 2017, 24 (01) :14-26
[44]   Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security [J].
Mahajan, Varun ;
Peddoju, Sateesh K. .
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, :829-834
[45]   Design of Network Security Experiment Teaching System Based on Honeypot Technology [J].
Zhu, Chen ;
Li, Qiang ;
Sun, Bin ;
Jin, Xinyu ;
Zhou, Yusun ;
Xie, Muhan .
2022 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS 22), 2022, :2132-2136
[46]   Implementation of a Modern Security Systems Honeypot Honey Network on Wireless Networks [J].
Wafi, Hibatul ;
Fiade, Andrew ;
Hakiem, Nashrul ;
Bahaweres, Rizal Broer .
2017 INTERNATIONAL YOUNG ENGINEERS FORUM (YEF-ECE), 2017, :91-96
[47]   Attack Detection and Forensics Using Honeypot in IoT Environment [J].
Shrivastava, Rajesh Kumar ;
Bashir, Bazila ;
Hota, Chittaranjan .
DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2019, 2019, 11319 :402-409
[48]   Using rootkits hiding techniques to conceal honeypot functionality [J].
Mohammadzad, Maryam ;
Karimpour, Jaber .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2023, 214
[49]   A rough set approach for automatic key attributes identification of zero-day polymorphic worms [J].
Sun, Wen-Chen ;
Chen, Yi-Ming .
EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (03) :4672-4679
[50]   A Novel Deception Defense-Based Honeypot System for Power Grid Network [J].
Feng, Mingjun ;
Xiao, Buqiong ;
Yu, Bo ;
Qian, Jianguo ;
Zhang, Xinxin ;
Chen, Peidong ;
Li, Bo .
SMART COMPUTING AND COMMUNICATION, 2022, 13202 :297-307