Intelligent Dynamic Honeypot Enabled by Dynamic Fuzzy Rule Interpolation

Dynamic fuzzy rule interpolation (D-FRI) utilises a transformation-based knowledge interpolation mechanism to maintain a concurrent rule base according to the requirements of a given application problem. This feature makes it well-suited for network security applications where the perpetual change in the network conditions and traffic is unavoidable. Honeypots have become an important part of the security work of any organisation, gathering detailed information about an attack and attackers, in an effort to design the most robust protection policy. A honeypot deceives attackers to believe that they are interacting with a real system, thereby hiding its identity. Fingerprinting is one of the biggest threats to any honeypot allowing an attacker to discover the identity of the honeypot since once identified, its usefulness is limited. A number of methods have been proposed to fingerprint a honeypot preventing it from functioning; yet, it is a very challenging task to detect fingerprinting in real-time. This paper presents an intelligent and dynamic honeypot based on the D-FRI approach. The resulting system is capable of detecting certain types of fingerprinting threat in the absence of matching rules, while being able to learn and maintain a dynamic rule base for more accurate identification of possible fingerprinting threats based on the current network traffic conditions.

[1]  Nitin Naik,et al.  Enhancing Windows Firewall Security Using Fuzzy Reasoning , 2016, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).

[2]  Hiok Chai Quek,et al.  Backward Fuzzy Rule Interpolation , 2014, IEEE Transactions on Fuzzy Systems.

[3]  Neil C. Rowe,et al.  Measuring the Effectiveness of Honeypot Counter-Counterdeception , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[4]  Nitin Naik,et al.  Applying Computational Intelligence for enhancing the dependability of multi-cloud systems using Docker Swarm , 2016, 2016 IEEE Symposium Series on Computational Intelligence (SSCI).

[5]  Gordon Fyodor Lyon,et al.  Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning , 2009 .

[6]  Nitin Naik,et al.  Fuzzy reasoning based Windows Firewall for preventing denial of service attack , 2016, 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).

[7]  Jie Li,et al.  An extended Takagi–Sugeno–Kang inference system (TSK+) with fuzzy interpolation and its rule base generation , 2018, Soft Comput..

[8]  L. Spitzner,et al.  Honeypots: Tracking Hackers , 2002 .

[9]  Nitin Naik,et al.  Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots , 2018, 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).

[10]  Anjali Sardana,et al.  Honeypots: A New Paradigm to Information Security , 2011 .

[11]  Qiang Shen,et al.  Dynamic Fuzzy Rule Interpolation and Its Application to Intrusion Detection , 2018, IEEE Transactions on Fuzzy Systems.

[12]  Nitin Naik,et al.  Application of dynamic fuzzy rule interpolation for intrusion detection: D-FRI-Snort , 2016, 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).

[13]  Nitin Naik,et al.  Fuzzy Logic Aided Intelligent Threat Detection in Cisco Adaptive Security Appliance 5500 Series Firewalls , 2018, 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).

[14]  Nitin Naik,et al.  D-FRI-WinFirewall: Dynamic fuzzy rule interpolation for Windows Firewall , 2017, 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).

[15]  Lloyd G. Greenwald,et al.  Toward Undetected Operating System Fingerprinting , 2007, WOOT.

[16]  Ebrahim H. Mamdani,et al.  An Experiment in Linguistic Synthesis with a Fuzzy Logic Controller , 1999, Int. J. Hum. Comput. Stud..

[17]  David Ball,et al.  Augmented windows fuzzy firewall for preventing denial of service attack , 2017, 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).

[18]  Qiang Shen,et al.  Adaptive Fuzzy Interpolation , 2011, IEEE Transactions on Fuzzy Systems.

[19]  Jie Li,et al.  Towards sparse rule base generation for fuzzy rule interpolation , 2016, 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).

[20]  Nitin Naik,et al.  Genetic algorithm-aided dynamic fuzzy rule interpolation , 2014, 2014 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).

[21]  N. Naik Dynamic Fuzzy Rule Interpolation , 2015 .

[22]  Fei Chao,et al.  Generalized Adaptive Fuzzy Rule Interpolation , 2017, IEEE Transactions on Fuzzy Systems.

[23]  Pan Su,et al.  Integration of interpolation and inference , 2012, 2012 12th UK Workshop on Computational Intelligence (UKCI).

[24]  Tossapon Boongoen,et al.  Extending Data Reliability Measure to a Filter Approach for Soft Subspace Clustering , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[25]  Nitin Naik,et al.  Fuzzy Inference Based Intrusion Detection System: FI-Snort , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.

[26]  Qiang Shen,et al.  Fuzzy interpolative reasoning via scale and move transformations , 2006, IEEE Transactions on Fuzzy Systems.

[27]  Nitin Naik,et al.  A Fuzzy Approach for Detecting and Defending Against Spoofing Attacks on Low Interaction Honeypots , 2018, 2018 21st International Conference on Information Fusion (FUSION).

[28]  Ying Li,et al.  Fuzzy Rule Based Interpolative Reasoning Supported by Attribute Ranking , 2018, IEEE Transactions on Fuzzy Systems.

[29]  Roger A. Grimes Hacking the Hacker: Learn From the Experts Who Take Down Hackers , 2017 .

[30]  Hiok Chai Quek,et al.  Towards dynamic fuzzy rule interpolation , 2013, 2013 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).

[31]  Vasilios Katos,et al.  Big data security analysis approach using Computational Intelligence techniques in R for desktop users , 2016, 2016 IEEE Symposium Series on Computational Intelligence (SSCI).