Mike Anastasiadis, K. Moschou, Kristina Livitckaia, K. Votis, D. Tzovaras
{"title":"面向车联网的新型高交互蜜罐网络","authors":"Mike Anastasiadis, K. Moschou, Kristina Livitckaia, K. Votis, D. Tzovaras","doi":"10.1109/MED59994.2023.10185669","DOIUrl":null,"url":null,"abstract":"Along with the evolution of communication technologies, cybersecurity has evolved, and so have its new directions and demands. There is a wide range of tools to detect, analyse, or protect systems from malicious activity. Yet, as new technologies are emerging and maturing, the need for particular domain solutions arises. This paper proposes a methodology for a honeypot network organisation mimicking vital autonomous vehicle sensors inside the Internet of Vehicles (IoV) infrastructure, along with attack propagation patterns analysis based on the logs collected from the honeypots. The discovery of sequential patterns is based on Markov Chain models applied in the honey-farm data. Further, these trained models are applied with graph-based algorithms to discover the interaction patterns between honeypots targeting the discovery of segments that were attacked in series. The intelligence produced from the analysis is used to rank and estimate the relative importance of the honeypots in their framework. The results of our study allowed us to identify common attacks on the IoV system, detect the geolocation of each attacker, and specify the usage of each honeypot node from the attacker’s perspective.","PeriodicalId":270226,"journal":{"name":"2023 31st Mediterranean Conference on Control and Automation (MED)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Novel High-Interaction Honeypot Network for Internet of Vehicles\",\"authors\":\"Mike Anastasiadis, K. Moschou, Kristina Livitckaia, K. Votis, D. Tzovaras\",\"doi\":\"10.1109/MED59994.2023.10185669\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Along with the evolution of communication technologies, cybersecurity has evolved, and so have its new directions and demands. There is a wide range of tools to detect, analyse, or protect systems from malicious activity. Yet, as new technologies are emerging and maturing, the need for particular domain solutions arises. This paper proposes a methodology for a honeypot network organisation mimicking vital autonomous vehicle sensors inside the Internet of Vehicles (IoV) infrastructure, along with attack propagation patterns analysis based on the logs collected from the honeypots. The discovery of sequential patterns is based on Markov Chain models applied in the honey-farm data. Further, these trained models are applied with graph-based algorithms to discover the interaction patterns between honeypots targeting the discovery of segments that were attacked in series. The intelligence produced from the analysis is used to rank and estimate the relative importance of the honeypots in their framework. The results of our study allowed us to identify common attacks on the IoV system, detect the geolocation of each attacker, and specify the usage of each honeypot node from the attacker’s perspective.\",\"PeriodicalId\":270226,\"journal\":{\"name\":\"2023 31st Mediterranean Conference on Control and Automation (MED)\",\"volume\":\"33 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 31st Mediterranean Conference on Control and Automation (MED)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MED59994.2023.10185669\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 31st Mediterranean Conference on Control and Automation (MED)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MED59994.2023.10185669","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Novel High-Interaction Honeypot Network for Internet of Vehicles
Along with the evolution of communication technologies, cybersecurity has evolved, and so have its new directions and demands. There is a wide range of tools to detect, analyse, or protect systems from malicious activity. Yet, as new technologies are emerging and maturing, the need for particular domain solutions arises. This paper proposes a methodology for a honeypot network organisation mimicking vital autonomous vehicle sensors inside the Internet of Vehicles (IoV) infrastructure, along with attack propagation patterns analysis based on the logs collected from the honeypots. The discovery of sequential patterns is based on Markov Chain models applied in the honey-farm data. Further, these trained models are applied with graph-based algorithms to discover the interaction patterns between honeypots targeting the discovery of segments that were attacked in series. The intelligence produced from the analysis is used to rank and estimate the relative importance of the honeypots in their framework. The results of our study allowed us to identify common attacks on the IoV system, detect the geolocation of each attacker, and specify the usage of each honeypot node from the attacker’s perspective.