Abstract
Honeypots are dedicated machines whose aim is to delay and divert attackers away from critical resources in order to study new methods and tools used by attackers. However, when looking most of current honeypot systems are statically configured and managed. They are either low interaction honeypot or high interaction honeypot. On this paper, we proposed Dynamic Hybrid Virtual Honeypots Architecture in a single machine. It is capable of adapting in constantly changing network environment using both active and passive scanning. It also mitigates the drawback of low and high interaction honeypots. We use low interaction honeypots as proxy to claim for multiple IP address and to filter uninteresting traffic whereas high interaction honeypots to give optimal level of realism. To capture, analyze and control attack method and tools we used a gateway. Finally, we deploy the proposed architecture and present statically analysis of attacks. The experiment result proves this architecture can claim for multiple IP address, filter uninteresting traffic and gives a realism response for attacker.
Highlights
ObjectivesThe main objective of this project is the in-depth analysis of attacks and the capture of malware
To have dynamicity and to mitigate the drawback of high and low interaction honeypot in order to study attacker tools and method we proposed new Dynamic Hybrid Virtual Honeypot Architecture
This paper provides a detailed overview of the Dynamic Hybrid Virtual Honeypot Architecture for capturing and analyzing network attacks based on standard network technologies
Summary
The main objective of this project is the in-depth analysis of attacks and the capture of malware
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Networked and Distributed Computing
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.