Adaptive and Flexible Virtual Honeynet

Honeypots have been largely employed to help securing computer systems and capture malicious activities. At present, virtual honeynets -network scenarios made of virtual honeypots- are frequently used to investigate the adversary's behaviour. The static deploying scheme used traditionally, in which the configuration of the honeynet is determined by security experts beforehand, lacks the capability of dynamically adapting its configuration after deployment. In this paper, a new adaptive and flexible virtual honeynet management system is proposed that dynamically creates, configures and deploys both low-interaction and high-interaction honeypots, emulating multiple operating systems. The results and measurements of the experiments carried out illustrate that new virtual honeynet system is more capable than previous virtual honeynet architectures.

[1]  Aitor Corchero,et al.  Distributed virtual scenarios over multi-host Linux environments , 2011, 2011 5th International DMTF Academic Alliance Workshop on Systems and Virtualization Management: Standards and the Cloud (SVM).

[2]  Alen Capalik Next-Generation Honeynet Technology with Real-Time Forensics for U.S. Defense , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[3]  Claudia Eckert,et al.  Nitro: Hardware-Based System Call Tracing for Virtual Machines , 2011, IWSEC.

[4]  Niels Provos,et al.  A Virtual Honeypot Framework , 2004, USENIX Security Symposium.

[5]  C. Stoll The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .

[6]  Riccardo Bettati,et al.  Camouflaging Virtual Honeypots , 2005 .

[7]  Fahim H. Abbasi,et al.  Experiences with a Generation III virtual Honeynet , 2009, 2009 Australasian Telecommunication Networks and Applications Conference (ATNAC).

[8]  Lok Kwong Yan,et al.  Virtual honeynets revisited , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[9]  Haifeng Wang,et al.  Dynamic Deploying Distributed Low-interaction Honeynet , 2012, J. Comput..

[10]  Xuxian Jiang,et al.  "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots , 2007, RAID.

[11]  Nogal Memari,et al.  Towards virtual honeynet based on LXC virtualization , 2014, 2014 IEEE REGION 10 SYMPOSIUM.

[12]  M. Curty Quantum cryptography: Know your enemy , 2014 .

[13]  Brian Hay,et al.  Automated Honeynet Deployment for Dynamic Network Environment , 2013, 2013 46th Hawaii International Conference on System Sciences.