Abstract
Network security is a growing concern today for organizations. Our network faces many new threats and unknown attacks. The traditional defense system can not response to the 0-day attacks. This paper is to design a linkage security defense system based on honeypot technique. The honeypot is a security resource whose value lies in being probed, attacked or compromised. We collect information of attacker and other threats actively with honeypot centered in linkage security defense system. With the information collected, the linkage system will update security system policies and rules in time. Therefore, we are able to improve our network security by the linkage security defense system in real time.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Mokube, I., Adams, M.: Honeypots: concepts, approaches, and challenges. In: ACMSE 2007, pp. 321–326. ACM, Winston-Salem (2007)
Mairh, A., Barik, D., Verma, K., Jena, D.: Honeypot in network security: a survey. In: ICCCS’11, pp. 600–605. ACM, New York (2011)
Krueger, T., Gascon, H., Krämer, N., Rieck, K.: Learning stateful models for network honeypots. In: AISec’12, pp. 37–48. ACM, Raleigh (2012)
Biedermann, S., Mink, M., Katzenbeisser, S.: Fast dynamic extracted honeypots in cloud computing. In: CCSW’12, pp. 13–18. ACM, Raleigh (2012)
Wang, P., Lei, W., Cunningham, R., Zou, C.C.: Honeypot detection in advanced botnet attacks. Int. J. Inf. Comput. Secur. 4, 30–51 (2010). Inderscience Publishers, Geneva
Portokalidis, G., Bos, H.: SweetBait: zero-hour worm detection and containment using low- and high-interaction. Comput. Netw.: Int. J. Comput. Telecommun. Netw. 51, 1256–1274 (2010). ScienceDirect, Amsterdam
Valli, C.: Honeypot technologies and their applicability as a strategic internal countermeasure. Int. J. Inf. Comput. Secur. 1, 430–436 (2007). Inderscience Publishers, Geneva
Tiwari, R., Jain, A.: Improving network security and design using honeypots. In: CUBE’12, pp. 847–852. ACM, Pune (2012)
Kim, H.-G., Kim, D.-J., Cho, S.-J., Park, M., Park, M.: An efficient visitation algorithm to improve the detection speed of high-interaction client honeypots. In: RACS’11, pp. 266–271. ACM, Miami (2011)
Niemi, O.-P., Levomäki, A., Manner, J.: Dismantling intrusion prevention systems. In: SIGCOMM’12, pp. 285–286. ACM, New York (2012)
Acknowledgements
This research project was supported by National Natural Science Foundation of China (No. 61302091).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Feng, G., Zhang, C., Zhang, Q. (2014). A Design of Linkage Security Defense System Based on Honeypot. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2013. Communications in Computer and Information Science, vol 426. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43908-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-662-43908-1_9
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43907-4
Online ISBN: 978-3-662-43908-1
eBook Packages: Computer ScienceComputer Science (R0)