POSTER: Dragging Attackers to Honeypots for Effective Analysis of Cybernetic Threats
| Autoři | |
|---|---|
| Rok publikování | 2014 |
| Druh | Prezentace v oblasti VaV (AV tvorba, WEB aplikace apod.) |
| Fakulta / Pracoviště MU | |
| Citace | |
| Přiložené soubory | |
| Popis | With the rising number of cyber threats in communication networks, there is a demand for attack analysis and the identification of new threats. Honeypots, tools for attack analysis and zero-day exploit discovery, are passive in waiting for an attacker. This paper proposes a novel approach to the effective utilization of honeypots based on cooperation between honeypots and the network in which they are deployed. We propose a framework for recognition of attacks in their early phase and dragging the network traffic to a honeypot before the attack causes any harm. We use flow-based network monitoring to detect initial phases of the attacks and propose prediction of the later phases of the attack. Malicious network traffic will be redirected to a honeypot for further analysis using a concept of a network funnel. |
| Související projekty: |