Abstract
A method for the dynamic control of resources of a honeypot system based on the graph of potential attacks is proposed to allow for the deployment of a virtual network infrastructure of any scale, according to which, under the conditions of limited computational resources, the virtual network infrastructure varies its configuration, adapting to the actions of an intruder.
REFERENCES
NIST National Vulnerability Database Statistics Results. https://nvd.nist.gov/vuln/search/statistics?form_ type=Basic&results_type=statistics&search_type=all. Cited January 15, 2021.
External pentests. 2020. https://www.ptsecurity.com/ru-ru/research/analytics/external-pentests-2020/. Cited September 11, 2020.
Zakaria, W. and Kiah, L., A review of dynamic and intelligent honeypots, ScienceAsia, 2013, vol. 39S, pp. 1–5. https://doi.org/10.2306/scienceasia1513-1874.2013.39S.001
Fan, W., Du, Zh., Fernández, D., and Villagrá, V.A., Enabling an anatomic view to investigate honeypot systems: A survey, IEEE Syst. J., 2017, vol. 12, no. 4, pp. 3906–3919. https://doi.org/10.1109/JSYST.2017.2762161
Honeypot Argos. htps://www.few.vu.nl/argos/. Cited September 20, 2020.
Talabis, R., Honeynets: A honeynet definition, The Philippine Honeypot Project, 2005, pp. 1–4.
Sharma, N. and Sran, S.S., Detection of threats in honeynet using honeywall, Int. J. Comput. Sci. Eng., 2011, vol. 3, no. 10, pp. 3332–3336.
Kalinin, M., Zegzhda, D., and Zavadskii, E., Protection of energy network infrastructures applying a dynamic topology virtualization, Energies, 2022, vol. 15, no. 11, p. 4123. https://doi.org/10.3390/en15114123
MITRE ATT&KE Lateral Movement. https://attack.mitre.org/tactics/TA0008/. Cited December 11, 2020.
Funding
This research is funded by the Ministry of Science and Higher Education of the Russian Federation as part of the World-class Research Center Program: Advanced Digital Technologies (contract no. 075-15-2022-311 dated April 20, 2022).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
The authors declare that they have no conflicts of interest.
Additional information
Translated by E. Oborin
About this article
Cite this article
Zavadskii, E.V., Ivanov, D.V. Counteracting Information Threats Using Honeypot Systems Based on a Graph of Potential Attacks. Aut. Control Comp. Sci. 56, 964–969 (2022). https://doi.org/10.3103/S0146411622080260
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411622080260