{"title":"通过克隆欺骗对抗网站攻击","authors":"Murat Arslan, Burak Çarıkçı, Y. M. Erten","doi":"10.1109/ISCTURKEY53027.2021.9654384","DOIUrl":null,"url":null,"abstract":"In this study, a deception-based solution to the web site attacks is proposed. No fake entity is created to attract the intruders. The suggested solution involves cloning the web site under attack after the intrusion is detected and diverting the attacker to this cloned web page. Intrusion detection system (IDS) is used for detecting the attacks and Docker is used as the virtualization technology to create the cloned web site. While the intruder is connected to the clone, information is gathered on her/his activities. The system is implemented and tested for different attack types, and performance measurements were carried out. The results show that the system implementation for static pages is feasible and the system performance is not significantly affected.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Deception Through Cloning against Web Site Attacks\",\"authors\":\"Murat Arslan, Burak Çarıkçı, Y. M. Erten\",\"doi\":\"10.1109/ISCTURKEY53027.2021.9654384\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this study, a deception-based solution to the web site attacks is proposed. No fake entity is created to attract the intruders. The suggested solution involves cloning the web site under attack after the intrusion is detected and diverting the attacker to this cloned web page. Intrusion detection system (IDS) is used for detecting the attacks and Docker is used as the virtualization technology to create the cloned web site. While the intruder is connected to the clone, information is gathered on her/his activities. The system is implemented and tested for different attack types, and performance measurements were carried out. The results show that the system implementation for static pages is feasible and the system performance is not significantly affected.\",\"PeriodicalId\":383915,\"journal\":{\"name\":\"2021 International Conference on Information Security and Cryptology (ISCTURKEY)\",\"volume\":\"43 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Information Security and Cryptology (ISCTURKEY)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCTURKEY53027.2021.9654384\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654384","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Deception Through Cloning against Web Site Attacks
In this study, a deception-based solution to the web site attacks is proposed. No fake entity is created to attract the intruders. The suggested solution involves cloning the web site under attack after the intrusion is detected and diverting the attacker to this cloned web page. Intrusion detection system (IDS) is used for detecting the attacks and Docker is used as the virtualization technology to create the cloned web site. While the intruder is connected to the clone, information is gathered on her/his activities. The system is implemented and tested for different attack types, and performance measurements were carried out. The results show that the system implementation for static pages is feasible and the system performance is not significantly affected.