2017 IEEE Conference on Communications and Network Security (CNS) 2017
DOI: 10.1109/cns.2017.8228653
|View full text |Cite
|
Sign up to set email alerts
|

HoneyProxy: Design and implementation of next-generation honeynet via SDN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(16 citation statements)
references
References 12 publications
0
15
0
Order By: Relevance
“…e front-end decoys transparently intercept and forward malicious commands to the back-end decoys, which use a low-interaction honeypot to show a high-interaction system view. Honeyproxy [12] can copy one attack traffic to multiple trapping points and then selects the most suitable one from all of the replies to feedback to the attacker. Honeypatches [13] use LXC as a trapping point and transfer the attack session that has touched the decoy patch to a specific trapping point for attack trapping.…”
Section: Related Workmentioning
confidence: 99%
“…e front-end decoys transparently intercept and forward malicious commands to the back-end decoys, which use a low-interaction honeypot to show a high-interaction system view. Honeyproxy [12] can copy one attack traffic to multiple trapping points and then selects the most suitable one from all of the replies to feedback to the attacker. Honeypatches [13] use LXC as a trapping point and transfer the attack session that has touched the decoy patch to a specific trapping point for attack trapping.…”
Section: Related Workmentioning
confidence: 99%
“…However, the false negatives will remain in the system while a substantial number of compromised nodes is evicted using DS 4 . • DS 5 -Low/high-interaction honeypots (LHs/HHs) [24]: LHs and HHs can be activated as a defense strategy. LHs and HHs differ in their deception detectability and cost.…”
Section: Defense Modelmentioning
confidence: 99%
“…As expected, since DD-based schemes allow the defender to learn additional attack intelligence which is considered in the NIDS, this naturally leads to the improvement of the TPR in the NIDS. 19)- (24) in this supplement document and Eqs. ( 9) and (10) in the main paper.…”
Section: B4 Tpr Of the Nids With Respect To The Number Of Gamesmentioning
confidence: 99%
See 1 more Smart Citation
“…HoneyProxy [13] proposed the essential component used in HoneyMix. The proxy module distributes the requests and selects the most appropriate response for the attacker to interact with.…”
Section: B Sdn-enabled Honeypot Architecturesmentioning
confidence: 99%