Proceedings of the 7th International Conference on Security of Information and Networks 2014
DOI: 10.1145/2659651.2659685
|View full text |Cite
|
Sign up to set email alerts
|

Framework for distributed virtual honeynets

Abstract: Honeypots and honeynets play a very important role in network security. In the paper, we evaluate the design of the distributed virtual honeynet, which consists of honeynets based on operating system-level virtualization. Using the advantages of this type of virtualization, we design and implement secure data capture engines -hardware and software sensors and one-way secure data collection. In the implementation, we consider the integration of several sensors (including memory, data storage, network traffic, u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 11 publications
0
1
0
1
Order By: Relevance
“…For the former, the highly interactive honeypots are proposed to give attackers the adequate feedbacks of information [29,30]. For the latter, the distributed honey-net system is set up to provide more accurate attacking report under circumstance of highly cooperating between virtual honeypots [31,32]. 3) Out-of-VM Monitoring.…”
Section: Related Workmentioning
confidence: 99%
“…For the former, the highly interactive honeypots are proposed to give attackers the adequate feedbacks of information [29,30]. For the latter, the distributed honey-net system is set up to provide more accurate attacking report under circumstance of highly cooperating between virtual honeypots [31,32]. 3) Out-of-VM Monitoring.…”
Section: Related Workmentioning
confidence: 99%
“…Diversas descrições de arquiteturas de honeypots podem ser encontradas na literatura [1][2][3][4][5][6][7][8]. Em [6,8] são mencionadas algumas ferramentas de análise de dados produzidos por honeypots, mas as ferramentas citadas não estão disponíveis publicamente.…”
Section: Introductionunclassified