12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops 2011
DOI: 10.1109/inm.2011.5990710
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive and self-configurable honeypots

Abstract: Honeypot evangelists propagate the message that honeypots are particularly useful for learning from attackers.However, by looking at current honeypots, most of them are statically configured and managed, which requires a priori knowledge about attackers. In this paper we propose a high interaction honeypot capable of learning from attackers and capable of dynamically changing its behavior using a variant of reinforcement learning. It can strategically block the execution of programs, lure the attacker by subst… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(14 citation statements)
references
References 13 publications
0
14
0
Order By: Relevance
“…Also state representation is needed to be improved. Moreover , experienced and sophisticated attackers could replace states and poison the learning process [11]. Gérard Wagener et al in , "Heliza: talking dirty to the attackers" , proposed Heliza, a self-adaptive honey pot system which uses reinforcement learning technique to interact with the attackers, self adaptability makes it to increase interaction with the attacker and gather much detailed information by using game theory & machine learning techniques.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Also state representation is needed to be improved. Moreover , experienced and sophisticated attackers could replace states and poison the learning process [11]. Gérard Wagener et al in , "Heliza: talking dirty to the attackers" , proposed Heliza, a self-adaptive honey pot system which uses reinforcement learning technique to interact with the attackers, self adaptability makes it to increase interaction with the attacker and gather much detailed information by using game theory & machine learning techniques.…”
Section: Literature Reviewmentioning
confidence: 99%
“…These researches can be classified in two major domains: Interaction and Deployment. Context-aware interaction focuses on decision making for DSs [15][16] [17]. The adaptive deployment domain is in an early stage compared to the first usage of DSs.…”
Section: Artificial Intelligence For Deception Based Network Securitymentioning
confidence: 99%
“…The main challenges are in configuring and maintaining the honeypots [11][12][13] . Since a honeypot is a deception tool which attracts and lures the attackers from attacking the real production hosts, its functionality and effectiveness depend on the technical configuration.…”
Section: Challenges In Deploying Honeypotsmentioning
confidence: 99%
“…Configuration issues include what type of operating system the honeypot will be running, how many TCP and UDP ports to offer, which network services to emulate, which IP address the honeypot will be monitoring, what the behaviour of the honeypot towww.scienceasia.org wards the attacker is, and whether it should respond to the attacker's interactions or be passive 11,13,14 .…”
Section: Challenges In Deploying Honeypotsmentioning
confidence: 99%
See 1 more Smart Citation