A Decoy Framework to Protect Server from Wireless Network Worms

被引:1
|
作者
Rajarajan, G. [1 ]
Ganesan, Lakshmanan [2 ]
机构
[1] Anjalai Ammal Mahalingam Engn Coll, Dept Comp Sci & Engn, Thiruvarur 610001, Tamil Nadu, India
[2] AC Coll Engn & Technol, Dept Comp Sci & Engn, Karaikkudi 630004, Tamil Nadu, India
关键词
Botnets; Decoyports; Honeymesh; Zombies;
D O I
10.1007/s11277-016-3298-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Intrusion is the primary step to conduct various kinds of network attacks. Most of the intrusion detection and intrusion prevention systems (IDPS) that make use of signature can detect only known attacks, but cannot save resources from new form of attacks like internet worms. Thus, it is necessary to collect information about unknown intrusion dynamically. Honeypots are useful security mechanism that deliberately lure intruders to probe, attack or compromise the systems. This paper presents an agent based honeymesh for protecting the network resources like servers from intrusion related attacks. In our strategy, agent programs make use of decoyports to lure intruders and redirects to honeymesh to understand attackers' activities. Also, the agents remove malicious processes and executable files on compromised server as soon as honeypots alerts those intrusions. This novel defense mechanism detects and removes new kinds of internet worms without using signatures.
引用
收藏
页码:1965 / 1978
页数:14
相关论文
共 50 条
  • [1] A Decoy Framework to Protect Server from Wireless Network Worms
    G. Rajarajan
    Lakshmanan Ganesan
    Wireless Personal Communications, 2017, 94 : 1965 - 1978
  • [2] A client-server Java']JavaScript code rewriting-based framework to detect the XSS worms from online social network
    Gupta, Shashank
    Gupta, B. B.
    Chaudhary, Pooja
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (21):
  • [3] Mathematical model on the transmission of worms in wireless sensor network
    Mishra, Bimal Kumar
    Keshri, Neha
    APPLIED MATHEMATICAL MODELLING, 2013, 37 (06) : 4103 - 4111
  • [4] A Central Mechanism to Protect Wireless Sensor Network from External Attacks
    Soleman, Hosam
    Payandeh, Ali
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2014, 9 (01): : 34 - 42
  • [5] NEW WIRELESS NETWORK CONCEPT SCRAPS SERVER
    PATTON, R
    ELECTRONICS-US, 1994, 67 (23): : 1 - 1
  • [6] A Complete Detection and Mitigation Framework to Protect a Network from DDoS Attacks
    Baishya, Ram Charan
    Bhattacharyya, D. K.
    IETE JOURNAL OF RESEARCH, 2022, 68 (01) : 315 - 332
  • [7] Optimal Control Model for Attack of Worms in Wireless Sensor Network
    Keshri, Neha
    Mishra, Bimal Kumar
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 251 - 272
  • [8] A Compact Antenna for Server Node of Wireless Sensor Network
    Phaebua, Kittisak
    Phongcharoenpanich, Chuwong
    Torrungrueng, Danai
    Chinrungrueng, Jatuporn
    2008 IEEE ANTENNAS AND PROPAGATION SOCIETY INTERNATIONAL SYMPOSIUM, VOLS 1-9, 2008, : 2266 - +
  • [9] NASCon: Network-Aware Server Consolidation for server-centric wireless datacenters*
    Mamun, Sayed Ashraf
    Ganguly, Amlan
    Markopoulos, Panos P.
    Kwon, Minseok
    Kwasinski, Andres
    SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS, 2021, 29 (29):
  • [10] A wireless sensor network to monitor and protect tigers in the wild
    Badescu, Alina-Mihaela
    Cotofana, Lucian
    ECOLOGICAL INDICATORS, 2015, 57 : 447 - 451