Skip to main content

A Design of Linkage Security Defense System Based on Honeypot

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 426))

Abstract

Network security is a growing concern today for organizations. Our network faces many new threats and unknown attacks. The traditional defense system can not response to the 0-day attacks. This paper is to design a linkage security defense system based on honeypot technique. The honeypot is a security resource whose value lies in being probed, attacked or compromised. We collect information of attacker and other threats actively with honeypot centered in linkage security defense system. With the information collected, the linkage system will update security system policies and rules in time. Therefore, we are able to improve our network security by the linkage security defense system in real time.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Mokube, I., Adams, M.: Honeypots: concepts, approaches, and challenges. In: ACMSE 2007, pp. 321–326. ACM, Winston-Salem (2007)

    Google Scholar 

  2. Mairh, A., Barik, D., Verma, K., Jena, D.: Honeypot in network security: a survey. In: ICCCS’11, pp. 600–605. ACM, New York (2011)

    Google Scholar 

  3. Krueger, T., Gascon, H., Krämer, N., Rieck, K.: Learning stateful models for network honeypots. In: AISec’12, pp. 37–48. ACM, Raleigh (2012)

    Google Scholar 

  4. Biedermann, S., Mink, M., Katzenbeisser, S.: Fast dynamic extracted honeypots in cloud computing. In: CCSW’12, pp. 13–18. ACM, Raleigh (2012)

    Google Scholar 

  5. Wang, P., Lei, W., Cunningham, R., Zou, C.C.: Honeypot detection in advanced botnet attacks. Int. J. Inf. Comput. Secur. 4, 30–51 (2010). Inderscience Publishers, Geneva

    Google Scholar 

  6. Portokalidis, G., Bos, H.: SweetBait: zero-hour worm detection and containment using low- and high-interaction. Comput. Netw.: Int. J. Comput. Telecommun. Netw. 51, 1256–1274 (2010). ScienceDirect, Amsterdam

    Article  Google Scholar 

  7. Valli, C.: Honeypot technologies and their applicability as a strategic internal countermeasure. Int. J. Inf. Comput. Secur. 1, 430–436 (2007). Inderscience Publishers, Geneva

    Google Scholar 

  8. Tiwari, R., Jain, A.: Improving network security and design using honeypots. In: CUBE’12, pp. 847–852. ACM, Pune (2012)

    Google Scholar 

  9. Kim, H.-G., Kim, D.-J., Cho, S.-J., Park, M., Park, M.: An efficient visitation algorithm to improve the detection speed of high-interaction client honeypots. In: RACS’11, pp. 266–271. ACM, Miami (2011)

    Google Scholar 

  10. Niemi, O.-P., Levomäki, A., Manner, J.: Dismantling intrusion prevention systems. In: SIGCOMM’12, pp. 285–286. ACM, New York (2012)

    Google Scholar 

Download references

Acknowledgements

This research project was supported by National Natural Science Foundation of China (No. 61302091).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gangfu Feng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Feng, G., Zhang, C., Zhang, Q. (2014). A Design of Linkage Security Defense System Based on Honeypot. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2013. Communications in Computer and Information Science, vol 426. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43908-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43908-1_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43907-4

  • Online ISBN: 978-3-662-43908-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics