Andreas Christoforou, K. H. Gjermundrød, I. Dionysiou
{"title":"HoneyCY: a configurable unified management framework for open-source honeypot services","authors":"Andreas Christoforou, K. H. Gjermundrød, I. Dionysiou","doi":"10.1145/2801948.2802021","DOIUrl":null,"url":null,"abstract":"Given the sophisticated nature of cyber attacks, existing passive defensive techniques may soon deemed to be inadequate to protect network and data assets at a satisfactory level. On the other hand, active defenses are promising techniques that are based on a proactive strategy where one anticipates attacks and prepares for the neutralization of the threats. Honeypots are systems, either isolated production systems or emulated ones, that are configured to be deliberately vulnerable, with the ultimate goal to be probed and exploited by attackers. Honeypots are powerful tools, however the inadequate (or lack of) documentation and the high degree of configuration complexity are prohibitive factors in their deployment. In this paper, we present honeyCY, a system that integrates existing honeypots into a single system, offering visualization features via a web interface or an Android app.","PeriodicalId":305252,"journal":{"name":"Proceedings of the 19th Panhellenic Conference on Informatics","volume":"46 Suppl 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 19th Panhellenic Conference on Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2801948.2802021","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Given the sophisticated nature of cyber attacks, existing passive defensive techniques may soon deemed to be inadequate to protect network and data assets at a satisfactory level. On the other hand, active defenses are promising techniques that are based on a proactive strategy where one anticipates attacks and prepares for the neutralization of the threats. Honeypots are systems, either isolated production systems or emulated ones, that are configured to be deliberately vulnerable, with the ultimate goal to be probed and exploited by attackers. Honeypots are powerful tools, however the inadequate (or lack of) documentation and the high degree of configuration complexity are prohibitive factors in their deployment. In this paper, we present honeyCY, a system that integrates existing honeypots into a single system, offering visualization features via a web interface or an Android app.