Skip to main content
Log in

Implementation of Honeypot Systems Based on the Potential Attack Graph

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

In this paper, we propose an implementation of a honeypot system that uses a method of dynamic resource management based on a graph of potential attacks to provide the ability to deploy a virtual network infrastructure of any scale. Its resource consumption is compared with the traditional honeypot system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.

Similar content being viewed by others

REFERENCES

  1. Zavadskii, E.V. and Ivanov, D.V., Countering information threats using Honeypot systems based on a graph of potential attacks, Probl. Inf. Bezop. Komp’yut. Sist., 2021, no. 1, pp. 79–85.

  2. Libvirt application development guide using python. https://libvirt.org/docs/libvirt-appdev-guide-python/en-US/ pdf/Version-1.1-Libvirt_Application_Development_Guide_Using_Python-en-US.pdf. Cited September 21, 2020.

  3. Tool documentation Fibratus. https://www.fibratus.io/#/overview/what-is-fibratus. Cited December 21, 2020.

  4. Framework FastAPI. https://fastapi.tiangolo.com. Cited December 10, 2020.

  5. Asynchronous server Uvicorn parameters. https://www.uvicorn.org/settings/. Cited December 10, 2020.

  6. Repository HoneyD. https://github.com/DataSoft/Honeyd. Cited December 11, 2020.

  7. Fingeprint database Nmap. https://github.com/nmap/nmap/blob/master/nmap-os-db. Cited December 11, 2020.

  8. Ovasapyan, T. and Moskvin, D., Security provision in WSN on the basis of the adaptive behavior of nodes, Fourth World Conf. on Smart Trends in Systems, Security and Sustainability (WorldS4), London, 2020, IEEE, 2020, pp. 81–85.  https://doi.org/10.1109/WorldS450073.2020.9210421

Download references

Funding

The work was supported by the Russian Foundation for Basic Research, project no. 18-29-03102.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. V. Ivanov.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by A. Ivanov

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zavadskii, E.V., Ivanov, D.V. Implementation of Honeypot Systems Based on the Potential Attack Graph. Aut. Control Comp. Sci. 55, 1194–1200 (2021). https://doi.org/10.3103/S0146411621080460

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411621080460

Keywords:

Navigation