Abstract
Network technology is developing rapidly and attack technique using this is diverse and the damage is growing. Therefore, collection of attack information and its active coping in order to handle to diverse attack become necessary urgently. Honeypot to collect attack information of attacker must provide many of the same actual resources, but it is not easy. In this paper, multiple virtual machines which utilize resources efficiently using low cost are generated by means of dynamic allocation technology and dynamic honeypot system using this is proposed. Distributed IDS by protocols is used to detect accurate intrusion of collected information. Performance of the proposed system was confirmed by the experiments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Niels P (2004) A Virtual honeypot framework. In: proceedings of the 13th USENIX security symposium, pp 1–14
Peng N, Dingbang X (2003) Learning attack strategies from intrusion alerts. In: Proceedings of the 10th ACM conference on computer and communications security, pp 200–209
Spitzner L (2002) Honeypots: tracking hackers. Addison-Wesley, Boston
Christian Platter, Reto Baumann, White Paper: Honeypots. http://www.inf.ethz.ch/personal/plattner/pdf/whitepaper.pdf
Kreibich C, Weaver N Kanich C, Cui W, Paxson V (2011) Practical containment for measuring modern malware system. In: Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, pp 397–412
Ali I, Thorsten H, Felix CF (2008) Monkey-spider: detecting malicious websites with low-interaction honeyclients. In: Sicherheit’08, pp 407–421
Corrado L, Ken M, Marc D (2005) Scriptgen: an automated script generation tool for honeyd. In: Proceedings of the 21st annual computer security application conference (ACSAC), pp 203–214
Nance Kara, Bishop Matt, Hay Brian (2008) Virtual machine introspection: observation or interface. IEEE Secur Priv 6(5):32–37
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Yang, HS. (2013). Honeypot Using Dynamic Allocation Technique with IP Scan. In: Kim, K., Chung, KY. (eds) IT Convergence and Security 2012. Lecture Notes in Electrical Engineering, vol 215. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5860-5_23
Download citation
DOI: https://doi.org/10.1007/978-94-007-5860-5_23
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5859-9
Online ISBN: 978-94-007-5860-5
eBook Packages: EngineeringEngineering (R0)