DocumentCode :
3541514
Title :
Mimicry Honeypot: A Brief Introduction
Author :
Leyi Shi ; Lanlan Jiang ; Deli Liu ; Xu Han
Author_Institution :
Coll. of Comput. & Commun. Eng., China Univ. of Pet. (East China), Qingdao, China
fYear :
2012
fDate :
21-23 Sept. 2012
Firstpage :
1
Lastpage :
4
Abstract :
The paper firstly analyzes the limitation of traditional defense methods, including the firewall and the IDS. Then the paper discusses the traditional honeypot system in detail. Unfortunately, the traditional honeypot is a passive active defense mechanism in nature, and could be unfavorable for cyber defense. Inspired by the mimetic phenomenon of the nature, we introduce the mimicry concept into the network defense, define the concept of protective coloration and warning coloration for cyber defense, and then formalize a mimicry honeypot model, which could perceive and adaptive the change of the network service and perform better camouflage. Several important issues are discussed in this paper. So far as we know, this is the first paper about the mimicry honeypot.
Keywords :
Internet; firewalls; IDS; Internet; cyber defense; defense methods; firewall; mimetic phenomenon; mimicry concept; mimicry honeypot system; network defense; network service; passive active defense mechanism; protective coloration concept; warning coloration concept; Adaptation models; Computers; Educational institutions; Internet; MIMICs; Security; Servers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communications, Networking and Mobile Computing (WiCOM), 2012 8th International Conference on
Conference_Location :
Shanghai
ISSN :
2161-9646
Print_ISBN :
978-1-61284-684-2
Type :
conf
DOI :
10.1109/WiCOM.2012.6478572
Filename :
6478572
Link To Document :
بازگشت