Abstract

Honeypots are dedicated machines whose aim is to delay and divert attackers away from critical resources in order to study new methods and tools used by attackers. However, when looking most of current honeypot systems are statically configured and managed. They are either low interaction honeypot or high interaction honeypot. On this paper, we proposed Dynamic Hybrid Virtual Honeypots Architecture in a single machine. It is capable of adapting in constantly changing network environment using both active and passive scanning. It also mitigates the drawback of low and high interaction honeypots. We use low interaction honeypots as proxy to claim for multiple IP address and to filter uninteresting traffic whereas high interaction honeypots to give optimal level of realism. To capture, analyze and control attack method and tools we used a gateway. Finally, we deploy the proposed architecture and present statically analysis of attacks. The experiment result proves this architecture can claim for multiple IP address, filter uninteresting traffic and gives a realism response for attacker.

Highlights

  • ObjectivesThe main objective of this project is the in-depth analysis of attacks and the capture of malware

  • To have dynamicity and to mitigate the drawback of high and low interaction honeypot in order to study attacker tools and method we proposed new Dynamic Hybrid Virtual Honeypot Architecture

  • This paper provides a detailed overview of the Dynamic Hybrid Virtual Honeypot Architecture for capturing and analyzing network attacks based on standard network technologies

Read more

Summary

Objectives

The main objective of this project is the in-depth analysis of attacks and the capture of malware

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call