Latest Research Progress of Honeypot Technology

被引:5
|
作者
Shi Leyi [1 ]
Li Yang [1 ]
Ma Mengfei [1 ]
机构
[1] China Univ Petr, Coll Comp & Commun Engn, Qingdao 266580, Peoples R China
基金
中国国家自然科学基金;
关键词
Network security; Honeypot technology; Honeynet; Anti-honeypot; Attack-defense strategy; Proactive defense; ARCHITECTURE; DEPLOYMENT; DEFENSE;
D O I
10.11999/JEIT180292
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Honeypot technology is a network trap in cyber defense. It can attract and deceive attackers and record their attack behavior, so as to study the target and attack means of the adversary and protect real service resources. However, because of the static configuration and the fixed deployment in traditional honeypots, it is as easy as a pie for intruders to identify and escape those traps, which makes them meaningless. Therefore, how to improve the dynamic characteristic and the camouflage performance of honeypot becomes a key problem in the field of honeypot. In this paper, the recent research achievements in honeypot are summarized. Firstly, the development history of honeypot in four stages is summed up. Subsequently, by focusing on the key honeypot mechanism, the analysis on process, deployment, counter-recognition and game theory are carried out. Finally, the achievements of honeypot in different aspects are characterized and the development trends of honeypot technology is depicted.
引用
收藏
页码:498 / 508
页数:11
相关论文
共 63 条
  • [61] Younes EE, 2016, COLLOQ INF SCI TECH, P638, DOI 10.1109/CIST.2016.7804964
  • [62] Zhaopeng Jia, 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC). Proceedings, P197, DOI 10.1109/DSC.2018.00036
  • [63] [诸葛建伟 Zhuge Jianwei], 2013, [软件学报, Journal of Software], V24, P825