A practical analysis of virtual honeypot mechanisms
暂无分享,去创建一个
This article proposes and evaluates the deployment of an automated virtual honeypot. Given that an unskilled attacker uses predefined exploit code, honeypots can be built to identify hackers and prevent them from attacking the production network. Building the virtual honeypot relies on mechanisms from multiple fields such as virtualization, scripting, penetration testing and system administration. The proposed solution also introduces automated scripts for virtual machine management, attack mitigation and recovery of compromised resources once an attack is detected. The complete solution will pose as an appealing multi-platform vulnerable network, presenting certain chosen weak points that once exploited trigger self recovery and denial of future attacks from the discovered source.
[1] Reinhold Kröger,et al. State of the art in autonomic computing and virtualization , 2007 .
[2] Thomas Wilhelm,et al. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research , 2007 .
[3] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .
[4] Nicolae Tapus,et al. Attack Evaluation and Mitigation Framework , 2010, 2010 Sixth International Conference on Networking and Services.