2013
DOI: 10.1155/2013/518213
|View full text |Cite
|
Sign up to set email alerts
|

Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet

Abstract: Virtualization plays an important role in the recent trend of cloud computing. It allows the administrator to manage and allocate hardware resources flexibly. However, it also causes some security issues. This is a critical problem for service providers, who simultaneously strive to defend against malicious attackers while providing legitimate users with high quality service. In this paper, the attack-defense scenario is formulated as a mathematical model where the defender applies both proactive and reactive … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 19 publications
0
8
0
Order By: Relevance
“…As is evident in Table 8, the value of contest intensity determines the nature of a battle. However, there should be no obvious trend for network compromise probability based on the different values of contest intensity [14][15][16][17]. In other words, the value of contest intensity prefers neither the defender nor the commanders.…”
Section: The Relationship Between Synergy Effectiveness and Contest Imentioning
confidence: 99%
See 1 more Smart Citation
“…As is evident in Table 8, the value of contest intensity determines the nature of a battle. However, there should be no obvious trend for network compromise probability based on the different values of contest intensity [14][15][16][17]. In other words, the value of contest intensity prefers neither the defender nor the commanders.…”
Section: The Relationship Between Synergy Effectiveness and Contest Imentioning
confidence: 99%
“…This function has been widely used in the literature addressing various economicsrelated activities, as well as international and civil wars [12,13]. In recent years, this theory has also been applied to the determination of the success probability for the attacker to compromise a system [14][15][16][17]. The form of contest success function is as follows:…”
Section: Scenariomentioning
confidence: 99%
“…For instance, availability objectives could be decomposed into timeliness, recoverability, redundancy, etc. Integrity objective could be decomposed into accountability, authentication, non-repudiation [53], dependability, veracity, etc., while confidentiality objective could be decomposed to authorisation, access control, etc. [6], [10], [15], [33].…”
Section: A) Primary and Secondary Objectivesmentioning
confidence: 99%
“…Existing security control efforts and implementations basically take on one of two broad control capabilities: proactivity and reactivity [53], [54]. Security metrics should thus mirror the same dimensions.…”
Section: A) Control Capabilitiesmentioning
confidence: 99%
“…A virtual Honeypot Framework [3] describes the design and implementation of Honeyd, a framework for virtual honeypots that simulates computer systems at the network level. Literature [4] propose that a honeynet can be used to assist the system administrator in identifying malicious traffic on the enterprise network. Literature [5] applies the honeypot concept to the email system in order to proactively detect bad providers where the honey consists of unique email address.…”
Section: Introductionmentioning
confidence: 99%