Abstract
In this paper, we propose an implementation of a honeypot system that uses a method of dynamic resource management based on a graph of potential attacks to provide the ability to deploy a virtual network infrastructure of any scale. Its resource consumption is compared with the traditional honeypot system.
Similar content being viewed by others
REFERENCES
Zavadskii, E.V. and Ivanov, D.V., Countering information threats using Honeypot systems based on a graph of potential attacks, Probl. Inf. Bezop. Komp’yut. Sist., 2021, no. 1, pp. 79–85.
Libvirt application development guide using python. https://libvirt.org/docs/libvirt-appdev-guide-python/en-US/ pdf/Version-1.1-Libvirt_Application_Development_Guide_Using_Python-en-US.pdf. Cited September 21, 2020.
Tool documentation Fibratus. https://www.fibratus.io/#/overview/what-is-fibratus. Cited December 21, 2020.
Framework FastAPI. https://fastapi.tiangolo.com. Cited December 10, 2020.
Asynchronous server Uvicorn parameters. https://www.uvicorn.org/settings/. Cited December 10, 2020.
Repository HoneyD. https://github.com/DataSoft/Honeyd. Cited December 11, 2020.
Fingeprint database Nmap. https://github.com/nmap/nmap/blob/master/nmap-os-db. Cited December 11, 2020.
Ovasapyan, T. and Moskvin, D., Security provision in WSN on the basis of the adaptive behavior of nodes, Fourth World Conf. on Smart Trends in Systems, Security and Sustainability (WorldS4), London, 2020, IEEE, 2020, pp. 81–85. https://doi.org/10.1109/WorldS450073.2020.9210421
Funding
The work was supported by the Russian Foundation for Basic Research, project no. 18-29-03102.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
The authors declare that they have no conflicts of interest.
Additional information
Translated by A. Ivanov
About this article
Cite this article
Zavadskii, E.V., Ivanov, D.V. Implementation of Honeypot Systems Based on the Potential Attack Graph. Aut. Control Comp. Sci. 55, 1194–1200 (2021). https://doi.org/10.3103/S0146411621080460
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411621080460