In this paper we mainly utilize the decentralized and tamper resistant

In this paper we mainly utilize the decentralized and

This preview shows page 3 - 5 out of 13 pages.

In this paper, we mainly utilize the decentralized and tamper-resistant characteristics of blockchain to maintain the normal function of our system and store attacking data for forensics. III. SYSTEM MODEL In this section, we present dynamic distributed honey- pot [37]–[42] model that is formed by N hosts and four services. As shown in Fig. 1 . There are two participators: an illegal attacker and a legal user who is synchronized with the real service (i.e., the legal client is able to keep space with a real service and it knows the exact location). N hosts make up a private blockchain, which is a P2P network and do not open the door to the outside world. A. BLOCKCHAIN The Ethereum [43] (i.e., blockchain platform) serves as the bottom layer in system. N hosts constitute a private blockchain which forms a P2P network. By computing hash value of the block, the host in private chain is able to mine the potential block and upload it to the chain. This mechanism guarantees the deployment architecture to be distributed and decentralized. The temporal main host will execute the ser- vices allocation algorithm and send corresponding encrypted information to other hosts. As is shown in Fig. 2 , in our system, the block’s miner H 0 (i.e., the host who successfully calculates a particular hash) becomes a main host at the period T 0 and another host H 1 may replace H 0 in the following circle. The host that has stronger computing power is more likely to be the temporal center controller. If the highly config- ured host suffers from attacks and its performance declines, it cannot serve as a center host for lacking enough computing power and other hosts will replace it automatically. Therefore, breakdown of the main host H 0 does not make a difference for the whole system (i.e., the system functions normally). The attack logs captured by one host are uploaded to blockchain and other nodes will synchronize these logs in our private chain. Thus, every node has the complete data, which are stored in a secure and tamper-resistant manner for future attack forensics. 72236 VOLUME 7, 2019
Image of page 3

Subscribe to view the full document.

L. Shi et al. : Dynamic Distributed Honeypot Based on Blockchain FIGURE 1. Dynamic distributed honeypot system model. FIGURE 2. Different main hosts. (a) Main host in T 0 . (b) Main host in T 1 . B. COMMUNICATION As described in Section III-A , the host that mines a block acts as an impermanent centering controller. This center host generates conversion information that assigns every host to start different services (i.e., to start real or honeypot service) according to a random generation algorithm. The data contain service numbers and 01 encodings, which will be encrypted by RSA 2048-bit encryption algorithm. Then the encrypted data are sent to other hosts by a temporal center host in our private realm. After arriving at the corresponding host, the information is decrypted and the plain text is obtained. For 01 encodings, zero is a symbol of starting a honeypot service and one represents a real service. Via the text, a bit orient com-
Image of page 4
Image of page 5
  • Fall '19
  • sir kashif

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Ask Expert Tutors You can ask 0 bonus questions You can ask 0 questions (0 expire soon) You can ask 0 questions (will expire )
Answers in as fast as 15 minutes