Skip to main content
Log in

Counteracting Information Threats Using Honeypot Systems Based on a Graph of Potential Attacks

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

A method for the dynamic control of resources of a honeypot system based on the graph of potential attacks is proposed to allow for the deployment of a virtual network infrastructure of any scale, according to which, under the conditions of limited computational resources, the virtual network infrastructure varies its configuration, adapting to the actions of an intruder.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.

REFERENCES

  1. NIST National Vulnerability Database Statistics Results. https://nvd.nist.gov/vuln/search/statistics?form_ type=Basic&results_type=statistics&search_type=all. Cited January 15, 2021.

  2. External pentests. 2020. https://www.ptsecurity.com/ru-ru/research/analytics/external-pentests-2020/. Cited September 11, 2020.

  3. Zakaria, W. and Kiah, L., A review of dynamic and intelligent honeypots, ScienceAsia, 2013, vol. 39S, pp. 1–5. https://doi.org/10.2306/scienceasia1513-1874.2013.39S.001

    Article  Google Scholar 

  4. Fan, W., Du, Zh., Fernández, D., and Villagrá, V.A., Enabling an anatomic view to investigate honeypot systems: A survey, IEEE Syst. J., 2017, vol. 12, no. 4, pp. 3906–3919. https://doi.org/10.1109/JSYST.2017.2762161

    Article  Google Scholar 

  5. Honeypot Argos. htps://www.few.vu.nl/argos/. Cited September 20, 2020.

  6. Talabis, R., Honeynets: A honeynet definition, The Philippine Honeypot Project, 2005, pp. 1–4.

    Google Scholar 

  7. Sharma, N. and Sran, S.S., Detection of threats in honeynet using honeywall, Int. J. Comput. Sci. Eng., 2011, vol. 3, no. 10, pp. 3332–3336.

    Google Scholar 

  8. Kalinin, M., Zegzhda, D., and Zavadskii, E., Protection of energy network infrastructures applying a dynamic topology virtualization, Energies, 2022, vol. 15, no. 11, p. 4123. https://doi.org/10.3390/en15114123

    Article  Google Scholar 

  9. MITRE ATT&KE Lateral Movement. https://attack.mitre.org/tactics/TA0008/. Cited December 11, 2020.

Download references

Funding

This research is funded by the Ministry of Science and Higher Education of the Russian Federation as part of the World-class Research Center Program: Advanced Digital Technologies (contract no. 075-15-2022-311 dated April 20, 2022).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. V. Ivanov.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by E. Oborin

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zavadskii, E.V., Ivanov, D.V. Counteracting Information Threats Using Honeypot Systems Based on a Graph of Potential Attacks. Aut. Control Comp. Sci. 56, 964–969 (2022). https://doi.org/10.3103/S0146411622080260

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411622080260

Keywords:

Navigation