DocumentCode :
2599509
Title :
Deception Methodology in Virtual Honeypots
Author :
Qassrawi, Mahmoud T. ; Hongli, Zhang
Author_Institution :
Comput. Sci. & Technol. Sch., Harbin Inst. of Technol. (HIT), Harbin, China
Volume :
2
fYear :
2010
fDate :
24-25 April 2010
Firstpage :
462
Lastpage :
467
Abstract :
The great advance in attacks against network has led to outgrowth of interest in more aggressive forms of defense to supplement the existing security approaches. One of these techniques involves the use of the deception to collect information about attacks. A honeypot is a security deception resource whose value lies in being probed, attacked or compromised. In this paper we present an overview of techniques used by honeypots to deceive the attacker and attacking process, and provide a comparison for persons who are interested in study and developing this new technology. We examine various types of honeypots, and deception techniques they use to counter attacks.
Keywords :
security of data; deception methodology; security deception resource; virtual honeypots; Computer networks; Wireless communication; Deception; emulation; honeynets; honeypot; intrusion detection; virtual honeypots;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 Second International Conference on
Conference_Location :
Wuhan, Hubei
Print_ISBN :
978-0-7695-4011-5
Electronic_ISBN :
978-1-4244-6598-9
Type :
conf
DOI :
10.1109/NSWCTC.2010.266
Filename :
5480892
Link To Document :
بازگشت