Corpus ID: 53371182

Hiding Computer Network Proactive Security Tools Unmasking Features

@inproceedings{Maximov2018HidingCN,
  title={Hiding Computer Network Proactive Security Tools Unmasking Features},
  author={Roman V. Maximov and Sergey Sokolovsky},
  year={2018}
}
Passive and proactive network security tools, based on cyber deception technologies, become more and more popular among classic tools. Using such tools gives an opportunity to prevent network attacks on the very beginning – at intelligence gathering stage. In this work we research one of these deceptive tools – a network tarpit. Based on LaBrea taprit, we investigate some fingerprints of its algorithms, that may lead to tarpit detecting and lowering overall security level. We used an open… Expand

Tables from this paper

Model of client-server information system functioning in the conditions of network reconnaissance
Expansion of possibilities and increase of efficiency of network reconnaissance on opening of client-server information systems actualize questions of maintenance of their stability to influences ofExpand
Development of Computer Network Methodology for Physical Online Guiding Core Literacy Evaluation System
  • Shenghua Qi
  • Computer Science
  • 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)
  • 2020
TLDR
Development of computer network methodology for the physical online guiding core literacy evaluation system is studied and the proposed model is applied into the physicalOnline guiding core Literacy evaluation system. Expand

References

SHOWING 1-10 OF 23 REFERENCES
Cyber Deception: Virtual Networks to Defend Insider Reconnaissance
TLDR
It is shown, that the RDS (Reconnaissance Deception System) system is able to invalidate an attackers information, delay the process of finding vulnerable hosts and identify the source of adversarial reconnaissance within a network, while only causing a minuscule performance overhead. Expand
Dempster-Shafer Evidence Combining for (Anti)-Honeypot Technologies
TLDR
It is shown how a systematic technique for evidence combining such as Dempster-Shafer theory can allow botmasters to determine the true nature of compromised machines with a relatively high certainty and demonstrate inherent limitations of current honeypot designs. Expand
In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention
TLDR
The current research investigated the effectiveness of the use of centralized system management technologies called Puppet and Virtual Machines in the implementation of automated honeypots for intrusion detection, correction and prevention. Expand
Uncovering network tarpits with degreaser
TLDR
This work develops degreaser, an efficient fingerprinting tool to remotely detect tarpits, and suggests several ways in which to advance the realism of current network tarpite, thereby raising the bar on tarpit-naïve as an operational security mechanism. Expand
Honeypot: a survey of technologies, tools and deployment
TLDR
This paper surveys the types of honeypot technologies and their deployments as an effective educational tool to study issues in network security and presents a primary tool for each type. Expand
Enabling an Anatomic View to Investigate Honeypot Systems: A Survey
TLDR
A novel decoy and captor (D-C) based taxonomy is proposed for the purpose of studying and classifying the various honeypot techniques and two subsets of features from the taxonomy are identified, which can greatly influence the honeypot performances. Expand
Improving network security and design using honeypots
TLDR
A model based on collaboration of the virtual honeyd, and virtual honeynets, with the addition of a different honeypots based IDS is proposed to improve the design of the existing security architecture. Expand
An empirical study of botnets on university networks using low-interaction honeypots
TLDR
This research project will address this security issue by investigating effective solutions to identify compromised machines in a university network by using interaction honeypots to study the attack behaviors of mobile devices on a "real-world" university wireless network. Expand
AHEAD: A New Architecture for Active Defense
TLDR
This paper advocates that, instead of adding additional fake systems in the corporate network, the production systems themselves should be instrumented to provide active defense capabilities, which allows containing costs and complexity, while at the same time provides the attacker with a more realistic-looking target, and gives the Incident Response Team more time to identify the attacker. Expand
A Survey on Anti-honeypot and Anti-introspection Methods
TLDR
This paper presents an overview on existing research of anti-honeypot and anti-introspection methods, and proposes its own taxonomy of detection vectors used by malware. Expand
...
1
2
3
...