基于蜜罐和动态规则创建的网络攻击行为预测混合框架

Renuka Prasad B, A. Abraham
{"title":"基于蜜罐和动态规则创建的网络攻击行为预测混合框架","authors":"Renuka Prasad B, A. Abraham","doi":"10.1109/ICCSN.2010.82","DOIUrl":null,"url":null,"abstract":"Honeypots are decoys designed to trap, delay, and gather information about attackers. All the previous work in the field was related mainly to intrusion detection system, but in this research work, the highlight is more focused on the novel approach of creation of a Honeypot schema which is powered by intelligence along with the design of classifier. The output generated by the classifier generates a dynamic list of attacks, which are then queued in the proposed Honeypot architecture built with neural network to understand various approach of behavior and patterns of the attacker. The network administrator collects all such relevant information over the network itself allowing the inbound network connection from the attacker to do so and the system creates a hybrid framework to prevent the probability of vulnerable and hostile situation over the network even before the attack event is performed by the attacker.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Hybrid Framework for Behavioral Prediction of Network Attack Using Honeypot and Dynamic Rule Creation with Different Context for Dynamic Blacklisting\",\"authors\":\"Renuka Prasad B, A. Abraham\",\"doi\":\"10.1109/ICCSN.2010.82\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Honeypots are decoys designed to trap, delay, and gather information about attackers. All the previous work in the field was related mainly to intrusion detection system, but in this research work, the highlight is more focused on the novel approach of creation of a Honeypot schema which is powered by intelligence along with the design of classifier. The output generated by the classifier generates a dynamic list of attacks, which are then queued in the proposed Honeypot architecture built with neural network to understand various approach of behavior and patterns of the attacker. The network administrator collects all such relevant information over the network itself allowing the inbound network connection from the attacker to do so and the system creates a hybrid framework to prevent the probability of vulnerable and hostile situation over the network even before the attack event is performed by the attacker.\",\"PeriodicalId\":255246,\"journal\":{\"name\":\"2010 Second International Conference on Communication Software and Networks\",\"volume\":\"61 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-02-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 Second International Conference on Communication Software and Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSN.2010.82\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Conference on Communication Software and Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSN.2010.82","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

蜜罐是设计用来诱捕、延迟和收集攻击者信息的诱饵。该领域以往的研究主要集中在入侵检测系统方面,而本研究的重点是基于智能的蜜罐模式的创建方法以及分类器的设计。分类器生成的输出生成一个动态攻击列表,然后将这些攻击列表在基于神经网络构建的蜜罐架构中排队,以了解攻击者的各种行为方法和模式。网络管理员通过网络本身收集所有这些相关信息,允许来自攻击者的入站网络连接这样做,系统创建一个混合框架,以防止在攻击者执行攻击事件之前网络上出现脆弱和敌对情况的可能性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Hybrid Framework for Behavioral Prediction of Network Attack Using Honeypot and Dynamic Rule Creation with Different Context for Dynamic Blacklisting
Honeypots are decoys designed to trap, delay, and gather information about attackers. All the previous work in the field was related mainly to intrusion detection system, but in this research work, the highlight is more focused on the novel approach of creation of a Honeypot schema which is powered by intelligence along with the design of classifier. The output generated by the classifier generates a dynamic list of attacks, which are then queued in the proposed Honeypot architecture built with neural network to understand various approach of behavior and patterns of the attacker. The network administrator collects all such relevant information over the network itself allowing the inbound network connection from the attacker to do so and the system creates a hybrid framework to prevent the probability of vulnerable and hostile situation over the network even before the attack event is performed by the attacker.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信