Chongxin Sun, Youjun Bu, Bo Chen, Desheng Zhang, Zhonglei Chen, Xiangyu Lu, Surong Zhang, Jia Sun
{"title":"人工智能技术在蜜罐技术中的应用","authors":"Chongxin Sun, Youjun Bu, Bo Chen, Desheng Zhang, Zhonglei Chen, Xiangyu Lu, Surong Zhang, Jia Sun","doi":"10.1109/IEEECONF52377.2022.10013349","DOIUrl":null,"url":null,"abstract":"Honeypot is a proactive defence technology introduced by the defence to change the asymmetry of the network offensive and defence game. Through deploying security resources without any production purpose, the defenders can deceive attackers to illegally use them to capture and analyse the attack behaviour to understand the attack tools, methods, speculate the attack intentions and motivations. This paper introduces the development process and the latest development direction of honeypot technology, comprehensively analyses the application situation of artificial intelligence technology in the key mechanisms of honeypot technology, and summarises the latest application of artificial intelligence technology in the deception environment construction, threat data capture and threat data analysis. Finally, the application of artificial intelligence technology in honeypot technology is discussed.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"40 6","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Application of Artificial Intelligence Technology in Honeypot Technology\",\"authors\":\"Chongxin Sun, Youjun Bu, Bo Chen, Desheng Zhang, Zhonglei Chen, Xiangyu Lu, Surong Zhang, Jia Sun\",\"doi\":\"10.1109/IEEECONF52377.2022.10013349\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Honeypot is a proactive defence technology introduced by the defence to change the asymmetry of the network offensive and defence game. Through deploying security resources without any production purpose, the defenders can deceive attackers to illegally use them to capture and analyse the attack behaviour to understand the attack tools, methods, speculate the attack intentions and motivations. This paper introduces the development process and the latest development direction of honeypot technology, comprehensively analyses the application situation of artificial intelligence technology in the key mechanisms of honeypot technology, and summarises the latest application of artificial intelligence technology in the deception environment construction, threat data capture and threat data analysis. Finally, the application of artificial intelligence technology in honeypot technology is discussed.\",\"PeriodicalId\":193681,\"journal\":{\"name\":\"2021 International Conference on Advanced Computing and Endogenous Security\",\"volume\":\"40 6\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-04-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Advanced Computing and Endogenous Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IEEECONF52377.2022.10013349\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Advanced Computing and Endogenous Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEEECONF52377.2022.10013349","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Application of Artificial Intelligence Technology in Honeypot Technology
Honeypot is a proactive defence technology introduced by the defence to change the asymmetry of the network offensive and defence game. Through deploying security resources without any production purpose, the defenders can deceive attackers to illegally use them to capture and analyse the attack behaviour to understand the attack tools, methods, speculate the attack intentions and motivations. This paper introduces the development process and the latest development direction of honeypot technology, comprehensively analyses the application situation of artificial intelligence technology in the key mechanisms of honeypot technology, and summarises the latest application of artificial intelligence technology in the deception environment construction, threat data capture and threat data analysis. Finally, the application of artificial intelligence technology in honeypot technology is discussed.