Dynamic Deploy Based on Honeynet

Article Preview

Abstract:

This paper propose an idea of dynamic deploy and relevant algorithms. The first step of dynamic deployment is that it will forecast the security situation through grey forecast model. Then, the virtual honeypots will be changed by imitating the biology actions. Hence, the dynamic Honeynet has the ability of disguising according to the realtime intrusion. It improves the effect in confusing hackers and weakens the attack. The model and relevant algorithms are presented. The results of experiment show that dynamic deploy scheme better effect in deceiving hackers with lower cost compared to the static deploy scheme.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

965-968

Citation:

Online since:

December 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] PROVOS N. 2004. A virtual honeypot framework[A]. Proceedings of 13th USENIX Security Symposiu-m[C]. San Diego, CA, USA,: 1-14.

Google Scholar

[2] Lianying Zhou, Deng Cao, NianYI Yuan. 2005. Analysis and research of virtual honeypot system fra-mework Honeyd, [J]. Computer Engineering and Applications, 27(1): 137-140.

Google Scholar

[3] Jianwei Zhuge, Xinhui Han. 2007 HoneyBow: A honeypot technology based on high interactive aut-omatically capture of malicious code, [J]. Journal on Communications, 28(12): 8-13.

Google Scholar

[4] Jie Wang, Huaping Hu, Yong Tang. 2006. The design and implementation of distributedvirtual trap network, [J]. Computational Engineering and Science, 28(2): 33-35.

Google Scholar

[5] Libo Ma, Haixin Duan, Xing Li. 2005. Honeypot deployment analysis, [J. Journal of dalian university of technology, 45(10)suppl: 150-155.

Google Scholar

[6] Yong Wei, Yifeng Lian. 2009. Based on log audit and performance correction algorithm of network security situation assessment model, [J]. JCST, 32(4): 763-764.

DOI: 10.3724/sp.j.1016.2009.00763

Google Scholar