Design of virtual honeynet collaboration system in existing security research networks

  title={Design of virtual honeynet collaboration system in existing security research networks},
  author={Jason Chih-Hung Chang and Yi-Lang Tsai},
  journal={2010 10th International Symposium on Communications and Information Technologies},
This paper proposes the virtual honeynet collaboration system (VHS) to improve the designs and concepts of the honeynet architectures. Using virtualization technologies (VTs) as a development platform, the proposed approach combines honeynet technologies to develop a new virtual honeynet architecture that implements VHS. This study also proposes the honeypot redirect-outbound (HRO) algorithm and the honeypot redirect-inbound (HRI) algorithm to solve the problems of honeypot module (HM… CONTINUE READING


Publications citing this paper.
Showing 1-3 of 3 extracted citations

Honeypot-based intrusion detection system: A performance analysis

2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) • 2016
View 5 Excerpts
Highly Influenced

Core Functions Analysis and Example Deployment of Virtual Honeynet

2011 First International Conference on Robot, Vision and Signal Processing • 2011


Publications referenced by this paper.
Showing 1-10 of 22 references

AnomBench: A Benchmark for Volume-Based Internet Anomaly Detection

GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference • 2009
View 6 Excerpts
Highly Influenced

Xen and the art of virtualization

SOSP • 2003
View 7 Excerpts
Highly Influenced

A case study on host based data analysis & cyber criminal profiling in Honeynets

J. S. Bhatia, R. Sehgal, H. Kaur
Proc. IEEE Int. Conf. Commun. Syst. and Netw., pp. 11-21, Apr. 2009 • 2009
View 1 Excerpt

Norazah “ Deploying virtual Honeypots on virtual machine monitor

A. Zakaria W. Zanoramy, S. Rohaidah, A.
Proc . IEEE Int . Conf . Commun . Syst . and Netw . • 2009

The Road to Greener IT Pastures

Computer • 2009
View 2 Excerpts

A Novel Hardware Assisted Full Virtualization Technique

2008 The 9th International Conference for Young Computer Scientists • 2008
View 2 Excerpts

Anatomy of Real-Time Intrusion Prevention System

R. Koller, R. Rangaswami, +5 authors K. Merrill
Proc. IEEE Int. Conf. Autonomic Comput., pp. 151-160, 2008. 803 • 2008
View 2 Excerpts

Similar Papers

Loading similar papers…