mtmt
Magyar Tudományos Művek Tára
XML
JSON
Átlépés a keresőbe
In English
Configuration Honeypots with an Emphasis on Logging of the Attacks and Redundancy
Palsa, J.
;
Hurtuk, J.
;
Chovancova, E.
;
Havira, M.
Angol nyelvű Konferenciaközlemény (Könyvrészlet) Tudományos
Megjelent:
IEEE [szerk.]. IEEE 20th Jubilee World Symposium on Applied Machine Intelligence and Informatics SAMI (2022): Proceedings. (2022) ISBN:9781665497046; 9781665497039
pp. 73-76
Azonosítók
MTMT: 33084681
DOI:
10.1109/SAMI54271.2022.9780801
Scopus:
85132209275
Egyéb URL:
https://ieeexplore.ieee.org/document/9780801/
The number of devices connected to a computer network has increased in recent years. This is also evidenced by the increased number of attacks and viruses by which attackers try to control devices in their favor. By using honeypots in the network infrastructure, we can attract such attackers to a fake system and obtain valuable information from them that we can use to improve network security. This diploma thesis deals with the issue of honeypot configuration in order to obtain information about attackers as well as ensuring system redundancy. We performed the redundancy using the Heartbeat system, which offers us cluster infrastructure services. Honeypot Honeyd was used to interact with low-level attackers on which we configured virtual devices. Honeypot Cowrie served us to interact with mid-level attackers. Subsequently, we verified the functionality of our solution using simulations in a computer network. We compared the amount of information obtained and based on it decided to deploy the Cowrie honeypot to a public IP address. The information was expressed by the behavioral manifestation of ELK Stakc in the extension of Kiban into the graphs and diagrams that we analyzed. © 2022 IEEE.
Idézett közlemények (2)
Hivatkozás stílusok:
IEEE
ACM
APA
Chicago
Harvard
CSL
Másolás
Nyomtatás
2026-04-18 02:13
×
Lista exportálása irodalomjegyzékként
Hivatkozás stílusok:
IEEE
ACM
APA
Chicago
Harvard
Nyomtatás
Másolás