A Novel Deception Defense-Based Honeypot System for Power Grid Network

被引:0
|
作者
Feng, Mingjun [1 ]
Xiao, Buqiong [1 ]
Yu, Bo [1 ]
Qian, Jianguo [2 ]
Zhang, Xinxin [1 ]
Chen, Peidong [1 ]
Li, Bo [3 ]
机构
[1] State Grid Tibet Elect Power Co Ltd, Chengdu, Peoples R China
[2] State Grid Zhejiang Elect Power Co Ltd, Quzhou, Peoples R China
[3] Beihang Univ, Beijing 100191, Peoples R China
来源
关键词
Honeypot; Deception defense; Power grid network; Virtual hosts;
D O I
10.1007/978-3-030-97774-0_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, as cyber-attacks have become more and more rampant, power grid networks are also facing more and more security threats, which have gradually become the focus attention of attackers. Traditional defense methods are represented by intrusion detection systems and firewalls, whose main purpose is to keep attackers out. However, with the diversification, concealment and complexity of attack methods, traditional defense methods are usually difficult to cope with the endless attack methods. To this end, this paper proposes a new type of honeypot system based on deception defense technology. While retaining the nature of the honeypot, it adopts dynamic deception approach to actively collect unused IP addresses in the power grid networks. Then, these unused IP addresses are used to construct dynamic virtual hosts. When an attacker initiates network access to these dynamic virtual hosts, they will proactively respond to the attacker or redirect the attack traffic to the honeypot in the background, thereby deceiving and trapping the attacker. The experimental results show that the proposed honeypot system can effectively expands the monitoring range of traditional honeypots and has a good defense effect against unknown attacks, thus effectively making up for the shortcomings of traditional defense methods.
引用
收藏
页码:297 / 307
页数:11
相关论文
共 50 条
  • [1] Application of network intrusion deception technology - Honeypot system
    Software Research Center, Civil Aviation University of China, Tianjin 300300, China
    不详
    不详
    Jisuanji Gongcheng, 2006, 13 (176-178+181):
  • [2] Honeypot: a supplemented active defense system for network security
    Zhang, F
    Zhou, SJ
    Qin, ZG
    Liu, JD
    PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 231 - 235
  • [3] MTD-Spamguard: a moving target defense-based spammer detection system in social network
    Park, Jin Ho
    Rathore, Shailendra
    Moon, Daesung
    Park, Jong Hyuk
    SOFT COMPUTING, 2018, 22 (20) : 6683 - 6691
  • [4] MTD-Spamguard: a moving target defense-based spammer detection system in social network
    Jin Ho Park
    Shailendra Rathore
    Daesung Moon
    Jong Hyuk Park
    Soft Computing, 2018, 22 : 6683 - 6691
  • [5] Honeypot-based Defense System Research and Design
    Zhang Li-juan
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, : 466 - 470
  • [6] A Design of Linkage Security Defense System Based on Honeypot
    Feng, Gangfu
    Zhang, Chen
    Zhang, Quan
    TRUSTWORTHY COMPUTING AND SERVICES, 2014, 426 : 70 - 77
  • [7] Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid
    Tian, Wen
    Ji, Xiaopeng
    Liu, Weiwei
    Liu, Guangjie
    Zhai, Jiangtao
    Dai, Yuewei
    Huang, Shuhua
    IEEE ACCESS, 2020, 8 (08): : 64075 - 64085
  • [8] The Design of Website Security Defense System Based on Honeypot Technology
    Yao, Jun
    Chen, Jing
    PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 1502 - 1507
  • [9] Study on the network active defense technology based on deception
    Yao, Lan
    Wang, Xin-Mei
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2008, 30 (03): : 65 - 69
  • [10] Strategic Defense and Attack in Deception based Network Security
    Fraunholz, Daniel
    Schotten, Hans Dieter
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 156 - 161