期刊名称:International Journal of Computer Science and Information Technologies
电子版ISSN:0975-9646
出版年度:2014
卷号:5
期号:3
页码:3250-3253
出版社:TechScience Publications
摘要:System security personnel fight a seemingly unending battle to secure their digital assets against an everincreasing onslaught of attacks. Honeypots- A security resource whose value lies in being probed, attacked, or compromised, provides a valuable tool to collect information about the behaviors of attackers in order to design and implement better defenses. Any commander will often tell his soldiers that to secure yourself against the enemy, you have to first know who your enemy is. This military doctrine readily applies to the world of network security. Just like the military, you have resources that you are trying to protect. To help protect these resources, you need to know who is your threat and how they are going to attack. On demand allocation of honeypots at right places on the network and at right time would considerably make the network more secure and harder to sneak into. This system is based on an idea of dynamically creating, modifying and managing virtual honeypots. This system combines the concept of honeypots and uses big data analyzer, Hadoop for quick information retrieval and analysis. The goal of this system is to create evanescent honeypots at right places and times, on demand
关键词:Honeypots; Virtual Honeypots; Hadoop; Dynamic;Honeypot Construction