Paper
12 May 2023 Honeynet optimization strategy based on attack graph
Zhang Sheng Yang, Hong Ling Li, Zhe Yang, Liu Zhi Ye
Author Affiliations +
Proceedings Volume 12641, International Conference on Cryptography, Network Security, and Communication Technology (CNSCT 2023); 1264105 (2023) https://doi.org/10.1117/12.2679157
Event: International Conference on Cryptography, Network Security, and Communication Technology (CNSCT 2023), 2023, Changsha, China
Abstract
Honeypot is an active defense mechanism in network security protection. Its main purpose is to collect various intrusion information. However, due to the complexity of attacker penetration attacks and the diversity of host vulnerabilities, a simple honeypot can’t to meet the defense requirements, so a honeynet system formed by a combination of various honeypots has emerged. But what kind of honeypots are included in the honeynet? How are honeypots connected? What is the reasonable size of the honeynet? These problems are restricting the development of honeynet. Therefore, the research of this paper is to analyze the vulnerability of an nodes in the network by establishing an attack graph, so as to formulate a honeynet deployment strategy. However, due to the difference in the network structure and the size of the honeynet, the effect of security protection will be very different. At the same time, considering the maintenance cost and protection benefits of the honeynet, when adopting a dynamic honeynet deployment method, we need to adjust the type and number of honeypots in the honeynet at any time. This paper uses ant colony algorithm and wolf swarm algorithm to optimize the honeynet, so as to realize the simplification of the attack graph and the dynamic configuration of the honeynet.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Zhang Sheng Yang, Hong Ling Li, Zhe Yang, and Liu Zhi Ye "Honeynet optimization strategy based on attack graph", Proc. SPIE 12641, International Conference on Cryptography, Network Security, and Communication Technology (CNSCT 2023), 1264105 (12 May 2023); https://doi.org/10.1117/12.2679157
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Mathematical optimization

Network security

Defense and security

Clouds

Information security

Defense technologies

Silver

Back to Top