Title :
Scalable Honeypot Architecture for Identifying Malicious Network Activities
Author :
Sadasivam, Gokul Kannan ; Hota, Chittaranjan
Author_Institution :
Dept. of Comput. Sci. & Inf. Syst., BITS, Hyderabad, India
Abstract :
Server honey pots are computer systems that hide in a network capturing attack packets. As the name goes, server honey pots are installed in server machines running a set of services. Enterprises and government organisations deploy these honey pots to know the extent of attacks on their network. Since, most of the recent attacks are advanced persistent attacks there is much research work going on in building better peripheral security measures. In this paper, the authors have deployed several honey pots in a virtualized environment to gather traces of malicious activities. The network infrastructure is resilient and provides much information about hacker´s activities. It is cost-effective and can be easily deployed in any organisation without specialized hardware.
Keywords :
computer crime; computer network security; file servers; virtualisation; advanced persistent attacks; attack packets; government organisations; hacker activities; malicious network activities identification; peripheral security measures; scalable honeypot architecture; server honeypots; server machines; virtualized environment; Computer architecture; Computer hacking; IP networks; Malware; Operating systems; Ports (Computers); Servers; Dionaea; Distributed honeypots; Glastopf; HoneyD; Honeypots; J-Honeypot; Kippo; Server honeypots;
Conference_Titel :
Emerging Information Technology and Engineering Solutions (EITES), 2015 International Conference on
Conference_Location :
Pune
Print_ISBN :
978-1-4799-1837-9
DOI :
10.1109/EITES.2015.15