A Decoy Framework to Protect Server from Wireless Network Worms

被引:1
|
作者
Rajarajan, G. [1 ]
Ganesan, Lakshmanan [2 ]
机构
[1] Anjalai Ammal Mahalingam Engn Coll, Dept Comp Sci & Engn, Thiruvarur 610001, Tamil Nadu, India
[2] AC Coll Engn & Technol, Dept Comp Sci & Engn, Karaikkudi 630004, Tamil Nadu, India
关键词
Botnets; Decoyports; Honeymesh; Zombies;
D O I
10.1007/s11277-016-3298-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Intrusion is the primary step to conduct various kinds of network attacks. Most of the intrusion detection and intrusion prevention systems (IDPS) that make use of signature can detect only known attacks, but cannot save resources from new form of attacks like internet worms. Thus, it is necessary to collect information about unknown intrusion dynamically. Honeypots are useful security mechanism that deliberately lure intruders to probe, attack or compromise the systems. This paper presents an agent based honeymesh for protecting the network resources like servers from intrusion related attacks. In our strategy, agent programs make use of decoyports to lure intruders and redirects to honeymesh to understand attackers' activities. Also, the agents remove malicious processes and executable files on compromised server as soon as honeypots alerts those intrusions. This novel defense mechanism detects and removes new kinds of internet worms without using signatures.
引用
收藏
页码:1965 / 1978
页数:14
相关论文
共 50 条
  • [41] A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network
    Lee, Kwang Hyun
    Hong, Choong Seon
    MANAGEMENT ENABLING THE FUTURE INTERNET FOR CHANGING BUSINESS AND NEW COMPUTING SERVICES, PROCEEDINGS, 2009, 5787 : 405 - 413
  • [42] Performance Evaluation of a Power-Efficient and Robust 60 GHz Wireless Server-to-Server Datacenter Network
    Mamun, Sayed Ashraf
    Umamaheswaran, Sree Gowrishankar
    Ganguly, Amlan
    Kwon, Minseok
    Kwasinski, Andres
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2018, 2 (04): : 1174 - 1185
  • [43] A Neural Network-Based Agent Framework for Mail Server Management
    Willow, Charles C.
    INTERNATIONAL JOURNAL OF INTELLIGENT INFORMATION TECHNOLOGIES, 2005, 1 (04) : 36 - 52
  • [44] THE MODEL OF DATA DELIVERY FROM THE WIRELESS BODY AREA NETWORK TO THE CLOUD SERVER WITH THE USE OF UNMANNED AERIAL VEHICLES
    Kirichek, Ruslan
    PROCEEDINGS - 30TH EUROPEAN CONFERENCE ON MODELLING AND SIMULATION ECMS 2016, 2016, : 603 - 606
  • [45] A Framework for Preserving the Privacy of Online Users Against XSS Worms on Online Social Network
    Chaudhary, Pooja
    Gupta, B. B.
    Gupta, Shashank
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2019, 14 (01) : 85 - 111
  • [46] Protect wireless systems from surges and lightning strikes
    Blichasz, C
    I&CS-INSTRUMENTATION & CONTROL SYSTEMS, 1998, 71 (07): : 61 - 65
  • [47] Protect wireless systems from surges and lightning strikes
    Blichasz, Chuck
    I and CS Instrumentation and Control Systems, 1998, 71 (07): : 61 - 65
  • [48] Self-Organization of Wireless Sensor Network for Autonomous Control in an IT Server Platform
    Khanna, Rahul
    Liu, Huaping
    Chen, Hsiao-Hwa
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [49] Improving Wireless Sensor Network Efficiency and Adaptability through an SOS Server Agent
    Jabeur, Nafaa
    McCarthy, James D.
    Graniero, Phil A.
    2008 FIRST INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES, VOLS 1 AND 2, 2008, : 416 - +
  • [50] Design of Multi-Function Solar-Wireless Network Server for Education
    Chen, Wenbo
    Liu, Yuli
    Zhou, Qingguo
    Zhang, Dechuan
    Mc Guire, Nicholas
    2008 IEEE INTERNATIONAL SYMPOSIUM ON IT IN MEDICINE AND EDUCATION, VOLS 1 AND 2, PROCEEDINGS, 2008, : 920 - +