skip to main content
10.1145/2659651.2659685acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Framework for distributed virtual honeynets

Authors Info & Claims
Published:09 September 2014Publication History

ABSTRACT

Honeypots and honeynets play a very important role in network security. In the paper, we evaluate the design of the distributed virtual honeynet, which consists of honeynets based on operating system-level virtualization. Using the advantages of this type of virtualization, we design and implement secure data capture engines - hardware and software sensors and one-way secure data collection. In the implementation, we consider the integration of several sensors (including memory, data storage, network traffic, users' activity, temperature, current consumption, and others) and development of secure distributed system. Since in this type of virtualization all honeypots share one kernel of operating system, it is sufficient to implement the sensors in one place - on host system. We also design and implement a central control unit, which manages all virtual honeynets. In paper, we also describe the implementation of proposed distributed virtual honeynet in a campus network.

References

  1. F. H. Abbasi and R. Harris. Experiences with a generation iii virtual honeynet. In Telecommunication Networks and Applications Conference (ATNAC), 2009 Australasian, pages 1--6. IEEE, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  2. J. Che, Q. He, K. Ye, and D. Huang. Performance combinative evaluation of typical virtual machine monitors. In High Performance Computing and Applications, pages 96--101. Springer, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. W. Chin, E. P. Markatos, S. Antonatos, and S. Ioannidis. Honeylab: large-scale honeypot deployment and resource sharing. In Network and System Security, 2009. NSS'09. Third International Conference on, pages 381--388. IEEE, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. P. Defibaugh-Chavez, R. Veeraghattam, M. Kannappa, S. Mukkamala, and A. Sung. Network based detection of virtual environments and low interaction honeypots. In Information Assurance Workshop, 2006 IEEE, pages 283--289. IEEE, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  5. C. Hoepers, K. Steding-Jessen, L. E. Cordeiro, and M. H. Chaves. A national early warning capability based on a network of distributed honeypots. In 17th Annual FIRST Conference on Computer Security Incident Handling, Singapore, 2005.Google ScholarGoogle Scholar
  6. S. Kumar, P. Singh, R. Sehgal, and J. Bhatia. Distributed honeynet system using gen iii virtual honeynet. International Journal of Computer Theory & Engineering, 4(4), 2012.Google ScholarGoogle Scholar
  7. R. McGrew. Experiences with honeypot systems: Development, deployment, and analysis. In System Sciences, 2006. HICSS'06. Proceedings of the 39th Annual Hawaii International Conference on, volume 9, pages 220a--220a. IEEE, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. H. project. Know Your Enemy: Learning about Security Threats. Addison Wesley, 2004.Google ScholarGoogle Scholar
  9. P. Sokol and Pisarčík. Data capture in virtual honeynet based on operating system level virtualization. In ICTIC 2014. The 3rd International Virtual Conference 2014, volume 3, pages 285--290. EDIS, Žilina, 2014.Google ScholarGoogle Scholar
  10. L. Spitzner. The honeynet project: Trapping the hackers. IEEE Security & Privacy, 1(2):15--23, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. L. Spitzner. Honeypots: Catching the insider threat. In Computer Security Applications Conference, 2003. Proceedings. 19th Annual, pages 170--179. IEEE, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. W3Techs. Web technology survey, usage of operating systems for websites.Google ScholarGoogle Scholar
  13. D. Watson and J. Riden. The honeynet project: Data collection tools, infrastructure, archives and analysis. In WOMBAT Workshop on Information Security Threats Data Collection and Sharing, pages 24--30, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. L. Yongli, Z. Jie, W. Shufang, and W. Zixian. Model and evaluation of a new honeynet. In Robotics and Applications (ISRA), 2012 IEEE Symposium on, pages 574--576. IEEE, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  15. Y. Zhou, J. Zhuge, N. Xu, X. Jiao, W. Sun, Y. Ji, and Y. Du. Matrix: A distributed honeynet and its applications. In 20th Annual FIRST Conference (FIRST'08). British Columbia, Canada, 2008.Google ScholarGoogle Scholar

Index Terms

  1. Framework for distributed virtual honeynets

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      SIN '14: Proceedings of the 7th International Conference on Security of Information and Networks
      September 2014
      518 pages
      ISBN:9781450330336
      DOI:10.1145/2659651

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 9 September 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      SIN '14 Paper Acceptance Rate32of109submissions,29%Overall Acceptance Rate102of289submissions,35%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader