Dynamic Distributed Honeypot Based on Blockchain

Honeypot technology can be applied to efficiently attract attackers and exhaust their resources. However, the traditional static honeypot is easy to be recognized by anti-honeypot technology. By contrast, most of the dynamic honeypots can simulate the real system in time, thus interacting with an intruder in disguise. In this paper, we employ the dynamic property of honeypot in four kinds of services of our system. However, this dynamic property shows up in a location and identification, indicating that genuine or fake services (honeypots) are changeable in different hosts. Thus, the dynamic property of our system differs from the dynamic honeypot aforementioned. Besides, we adopt the blockchain platform (Ethereum) to decentralize our system and store the port access data by delivering a private chain. To illustrate the effectiveness of our scheme in theory and practice, security analysis, eavesdropping attack, scanning attack, and DoS attack experiments are conducted. The results show that our scheme is valid in safeguarding against network attack.

[1]  Liu Xin,et al.  Game Theoretic Analysis for the Feature of Mimicry Honeypot , 2013 .

[2]  Brian Hay,et al.  Automated Honeynet Deployment for Dynamic Network Environment , 2013, 2013 46th Hawaii International Conference on System Sciences.

[3]  Feng Xia,et al.  On Achieving Asynchronous Energy-Efficient Neighbor Discovery for Mobile Sensor Networks , 2018, IEEE Transactions on Emerging Topics in Computing.

[4]  Jiguo Yu,et al.  RMTS: A robust clock synchronization scheme for wireless sensor networks , 2019, J. Netw. Comput. Appl..

[5]  Zhili Sun,et al.  Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems , 2017, IEEE Internet of Things Journal.

[6]  Jia Chun-fu Research on dynamic array honeypot for collaborative network defense strategy , 2012 .

[7]  Chun-fu Jia,et al.  A Game Theoretic Analysis for the Honeypot Deceptive Mechanism: A Game Theoretic Analysis for the Honeypot Deceptive Mechanism , 2012 .

[8]  Jong Hyuk Park,et al.  DistArch-SCNet: Blockchain-Based Distributed Architecture with Li-Fi Communication for a Scalable Smart City Network , 2018, IEEE Consumer Electronics Magazine.

[9]  Chris Moore,et al.  Detecting Ransomware with Honeypot Techniques , 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC).

[10]  Sachin Shetty,et al.  Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).

[11]  Ralph Deters,et al.  Performance analysis of ethereum transactions in private blockchain , 2017, 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS).

[12]  David Fernández,et al.  Versatile virtual honeynet management framework , 2017, IET Inf. Secur..

[13]  Feng Xia,et al.  Probabilistic Detection of Missing Tags for Anonymous Multicategory RFID Systems , 2017, IEEE Transactions on Vehicular Technology.

[14]  Yan Zhang,et al.  Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains , 2017, IEEE Transactions on Industrial Informatics.

[15]  Ramesh Chandra Joshi,et al.  An auto-responsive honeypot architecture for dynamic resource allocation and QoS adaptation in DDoS attacked networks , 2009, Comput. Commun..

[16]  Daniel Jackson,et al.  Software Abstractions - Logic, Language, and Analysis , 2006 .

[17]  Honglong Chen,et al.  A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs , 2016, IEEE Transactions on Vehicular Technology.

[18]  Rizal Broer Bahaweres,et al.  Implementation of a modern security systems honeypot Honey Network on wireless networks , 2017, 2017 International Young Engineers Forum (YEF-­ECE).

[19]  H. Artail,et al.  A Dynamic Honeypot Design for Intrusion Detection , 2004, The IEEE/ACS International Conference on Pervasive Services.

[20]  Stefano Russo,et al.  Trust Management in Fog/Edge Computing by Means of Blockchain Technologies , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[21]  Hans D. Schotten,et al.  An adaptive honeypot configuration, deployment and maintenance strategy , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[22]  Khashayar Kotobi,et al.  Secure Blockchains for Dynamic Spectrum Access: A Decentralized Database in Moving Cognitive Radio Networks Enhances Security and User Access , 2018, IEEE Vehicular Technology Magazine.

[23]  Feng Xia,et al.  Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems , 2018, IEEE Internet of Things Journal.

[24]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[25]  Ville Leppänen,et al.  A Survey on Anti-honeypot and Anti-introspection Methods , 2017, WorldCIST.

[26]  Jiguo Yu,et al.  MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems , 2018, IEEE Transactions on Vehicular Technology.

[27]  Zhihui Du,et al.  Adaptive and Flexible Virtual Honeynet , 2015, MSPN.

[28]  Tomas Kulik,et al.  A Framework for Threat-Driven Cyber Security Verification of IoT Systems , 2018, 2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW).

[29]  Saeedi Alireza,et al.  A Dynamic Approach for Honeypot Management , 2012 .

[30]  Srinivas Devadas,et al.  Catena: Efficient Non-equivocation via Bitcoin , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[31]  Anirban Basu,et al.  On blockchain-based anonymized dataset distribution platform , 2017, 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA).

[32]  Daniel Jeswin Nallathambi,et al.  Use of honeypots for mitigating DoS attacks targeted on IoT networks , 2017, 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP).

[33]  Saurabh Chamotra,et al.  Honeypot Deployment in Broadband Networks , 2016, ICISS.

[34]  Hairong Qi,et al.  Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server , 2019, IEEE Transactions on Mobile Computing.

[35]  Hassan Artail,et al.  A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks , 2006, Comput. Secur..

[36]  Xiuzhen Cheng,et al.  A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications , 2018, IEEE Access.

[37]  Eric Filiol,et al.  On blockchain security and relevant attacks , 2018, 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM).

[38]  Yang Li,et al.  Performance Analysis of Honeypot with Petri Nets , 2018, Inf..

[39]  Honglong Chen,et al.  Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems With Unknown Tags , 2017, IEEE Internet of Things Journal.

[40]  Maged Hamada Ibrahim SecureCoin: A Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem , 2017, Int. J. Netw. Secur..

[41]  Younès El Bouzekri El Idrissi,et al.  A security approach for social networks based on honeypots , 2016, 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt).

[42]  Ki-Hyung Kim,et al.  Dynamic Access Control Scheme for IoT Devices using Blockchain , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).

[43]  Max Mühlhäuser,et al.  Multi-stage attack detection and signature generation with ICS honeypots , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.