Detecting and Analyzing Zero-day Attacks using Honeypots

被引:11
|
作者
Musca, Constantin [1 ]
Mirica, Emma [1 ]
Deaconescu, Razvan [1 ]
机构
[1] Univ Politehn Bucuresti, Dept Comp Sci & Engn, Bucharest, Romania
关键词
honeypot; zero-day attacks; intrusion detection/prevention system;
D O I
10.1109/CSCS.2013.94
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computer networks are overwhelmed by self propagating malware (worms, viruses, trojans). Although the number of security vulnerabilities grows every day, not the same thing can be said about the number of defense methods. But the most delicate problem in the information security domain remains detecting unknown attacks known as zero-day attacks. This paper presents methods for isolating the malicious traffic by using a honeypot system and analyzing it in order to automatically generate attack signatures for the Snort intrusion detection/prevention system. The honeypot is deployed as a virtual machine and its job is to log as much information as it can about the attacks. Then, using a protected machine, the logs are collected remotely, through a safe connection, for analysis. The challenge is to mitigate the risk we are exposed to and at the same time search for unknown attacks.
引用
收藏
页码:543 / 548
页数:6
相关论文
共 50 条
  • [31] Zero-Day Guardian: A Dual Model Enabled Federated Learning Framework for Handling Zero-Day Attacks in 5G Enabled IIoT
    Verma, Priyanka
    Bharot, Nitesh
    Breslin, John G.
    O'Shea, Donna
    Vidyarthi, Ankit
    Gupta, Deepak
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 3856 - 3866
  • [32] Zero-day and zero-click attacks on digital banking: a comprehensive review of double trouble
    Yasmeen, Kausar
    Adnan, Muhammad
    [J]. RISK MANAGEMENT-AN INTERNATIONAL JOURNAL, 2023, 25 (04):
  • [33] Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection
    Ali, Shamshair
    Rehman, Saif Ur
    Imran, Azhar
    Adeem, Ghazif
    Iqbal, Zafar
    Kim, Ki-Il
    [J]. ELECTRONICS, 2022, 11 (23)
  • [34] Zero-day and zero-click attacks on digital banking: a comprehensive review of double trouble
    Kausar Yasmeen
    Muhammad Adnan
    [J]. Risk Management, 2023, 25
  • [35] Zero-Day Attack Detection using Ensemble Technique
    Wangde, Fawaz, I
    Mulay, Shivam P.
    Adhao, Rahul B.
    Pachghare, Vinod K.
    [J]. INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2021, 12 (05): : 551 - 557
  • [36] A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling
    Wang, Guizhou
    Welburn, Jonathan W.
    Hausken, Kjell
    [J]. GAMES, 2020, 11 (04): : 1 - 26
  • [37] Malware-SMELL: A zero-shot learning strategy for detecting zero-day vulnerabilities
    Barros, Pedro H.
    Chagas, Eduarda T. C.
    Oliveira, Leonardo B.
    Queiroz, Fabiane
    Ramos, Heitor S.
    [J]. COMPUTERS & SECURITY, 2022, 120
  • [38] Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks
    Wang, Lingyu
    Zhang, Mengyuan
    Jajodia, Sushil
    Singhal, Anoop
    Albanese, Massimiliano
    [J]. COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 494 - 511
  • [39] Zero-Day Malware Detection
    Gandotra, Ekta
    Bansal, Divya
    Sofat, Sanjccv
    [J]. 2016 SIXTH INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING AND SYSTEM DESIGN (ISED 2016), 2016, : 171 - 175
  • [40] ZERO-DAY WITHDRAWALS REEXAMINED
    不详
    [J]. JAVMA-JOURNAL OF THE AMERICAN VETERINARY MEDICAL ASSOCIATION, 2019, 255 (07): : 771 - 771