Section IV illustrates the process of security analysis of our scheme in Alloy

Section iv illustrates the process of security

This preview shows page 2 - 4 out of 13 pages.

Section IV illustrates the process of security analysis of our scheme in Alloy. The experiments are conducted in Section V and Section VI concludes this paper. II. RELATED WORK In this section, we will conduct the literature review on hon- eypot and blockchain. A. HONEYPOT A honeypot is designed to attract intruders for exhausting the attacking resources and for protecting the real system. There are some new application fields for this technology, such as wireless network [13], social network [14] or industrial con- trol network [15], [16]. It can be used to defend against Denial of Service (DoS), Distributed Denial of Service (DDoS), ransomware [17], bandwidth attack [18] and so on. In terms of DoS attack, Anirudh [19] utilized honeypot for mitigating DoS in Internet of Things (IoT) devices. By comparing with logging library information, the system isolates abnormal requests in the honeypot trap and records the data of source of attack. For the DDoS attack, Anjali and Ramesh [9] proposed an auto-responsive honeypot architecture. Any suspicious traffic would be redirected to the isolated honeypot, further protecting the real system. Besides, it is worth mentioning that some honeypot schemes are dynamic. The dynamic property mainly reflects in configuration and deployment. Kuwatly [8] proposes a dynamic honeypot scheme and utilizes Nmap, P0f and Snort for active detection and passive fingerprint recognition. Hon- eyd and some highly interactive honeypots are used for net- work simulation and redirection of network flow respectively. The dynamic honeypot engine communicates with modules mentioned above, dynamically configuring Honeyd and pro- viding configurable interface. Hassan et al. [20] dynamically adjusts honeypots to simulate the real industrial network in real time(i.e., the honeypot is a dummy of the real sys- tem) and allocates unused IP addresses to Honeyd cluster. VOLUME 7, 2019 72235
Image of page 2

Subscribe to view the full document.

L. Shi et al. : Dynamic Distributed Honeypot Based on Blockchain Saeedi et al. [21] studies dynamic honeypot management. According to the data collected from routers, firewalls, IDSs and honeypots, the configuration of honeypots is dynamically adjusted to adapt to the network environment. Fan et al. [22] combines a highly interactive honeypot with the low inter- active one. An adaptive honeynet scheme is implemented by simulating some operating systems. The key module of this scheme is Honeybrid Gateway, which contains decision and redirection parts. The former is used to capture and transmit specific network traffic to Honeyd. The latter aims at redirecting Honeyd’s flow to highly interactive honey field. The works mentioned above are about dynamic honeypot configuration scheme. There are some works about dynamic honeypot deployment. Hecher and Hay [23] proposes an automation honeypot deployment scheme. Active and passive network flow detection technologies are utilized for moni- toring network. User’s configuration information is stored in database, which can serve as a classification criterion for gen- erating new honeynet, limiting bandwidth and targeting net- work IP range. A dynamic honeypot scheme Honeyvers based
Image of page 3
Image of page 4
  • Fall '19
  • sir kashif

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Ask Expert Tutors You can ask bonus questions You can ask questions ( expire soon) You can ask questions (will expire )
Answers in as fast as 15 minutes