Honeypot Generator using Software Defined Networks and Recursively Defined Topologies

Carol Sebastian Bontaș, Ioan Stan, R. Rughinis
{"title":"Honeypot Generator using Software Defined Networks and Recursively Defined Topologies","authors":"Carol Sebastian Bontaș, Ioan Stan, R. Rughinis","doi":"10.1109/RoEduNet57163.2022.9921097","DOIUrl":null,"url":null,"abstract":"The domain of cyber security represents a constant struggle between researchers and hackers, a continuous competition where the global digital infrastructure is at stake. Throughout the years, various protective measures have been developed to prevent against an increasing number of exploits that are becoming more and more complex and refined. Instead of concentrating on general mitigating techniques, our proposal orients towards creating performant honeypots which are safe and isolated environments that attract malicious users for the purpose of studying their invasive techniques. Firstly, this paper introduces an original method of describing, from a mathematically point of view, recursively defined topologies and presents a proposed algorithm used in constructing them. Secondly, we suggest a novel architecture which combines recursively defined topologies (RDT), software-defined networks (SDN) and an orchestrator engine for containerized infrastructure in order to develop a high-interaction honeypot which simulates an entire data center using a single physical host. The proposed implementation may represent a promising framework used as a developing platform for more complex honeypots used in either researching malicious human behavior or in the IT industry as a defensive measure. Regarding achieved results, the proposed implementation accomplishes notable results in deceptive techniques, isolation and effortless configurability.","PeriodicalId":302692,"journal":{"name":"2022 21st RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 21st RoEduNet Conference: Networking in Education and Research (RoEduNet)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RoEduNet57163.2022.9921097","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The domain of cyber security represents a constant struggle between researchers and hackers, a continuous competition where the global digital infrastructure is at stake. Throughout the years, various protective measures have been developed to prevent against an increasing number of exploits that are becoming more and more complex and refined. Instead of concentrating on general mitigating techniques, our proposal orients towards creating performant honeypots which are safe and isolated environments that attract malicious users for the purpose of studying their invasive techniques. Firstly, this paper introduces an original method of describing, from a mathematically point of view, recursively defined topologies and presents a proposed algorithm used in constructing them. Secondly, we suggest a novel architecture which combines recursively defined topologies (RDT), software-defined networks (SDN) and an orchestrator engine for containerized infrastructure in order to develop a high-interaction honeypot which simulates an entire data center using a single physical host. The proposed implementation may represent a promising framework used as a developing platform for more complex honeypots used in either researching malicious human behavior or in the IT industry as a defensive measure. Regarding achieved results, the proposed implementation accomplishes notable results in deceptive techniques, isolation and effortless configurability.
使用软件定义网络和递归定义拓扑的蜜罐生成器
网络安全领域代表着研究人员和黑客之间的持续斗争,这是一场危及全球数字基础设施的持续竞争。多年来,已经制定了各种保护措施来防止越来越多的攻击,这些攻击变得越来越复杂和精细。我们的建议不是专注于一般的缓解技术,而是侧重于创建高性能的蜜罐,这些蜜罐是安全和隔离的环境,可以吸引恶意用户来研究他们的入侵技术。首先,本文从数学的角度介绍了一种描述递归定义拓扑的原始方法,并提出了一种用于构造递归定义拓扑的算法。其次,我们提出了一种新的架构,它结合了递归定义拓扑(RDT)、软件定义网络(SDN)和容器化基础设施的编排引擎,以开发一个高交互性的蜜罐,它使用单个物理主机模拟整个数据中心。提议的实现可能代表了一个有前途的框架,它被用作更复杂的蜜罐的开发平台,用于研究恶意的人类行为或在IT行业中作为防御措施。就取得的成果而言,所提出的实现在欺骗技术、隔离性和轻松可配置性方面取得了显著的成果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信