2019 International Conference on Information and Communication Technology Convergence (ICTC) 2019
DOI: 10.1109/ictc46691.2019.8939791
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Virtual Network Honeypot

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…Logically, this stands to reason given a honeypot or honeynet is a computing system and therefore all of the complexity issues driving the development of autonomic computing apply. What's more, without autonomy, the literature suggests honeypots and honeynets will not be able to escape from under the administration and maintenance burden [1,39,25]. Such goes hand in hand with the positive upwards trend towards ML integration we observed.…”
Section: Open Challengesmentioning
confidence: 71%
See 1 more Smart Citation
“…Logically, this stands to reason given a honeypot or honeynet is a computing system and therefore all of the complexity issues driving the development of autonomic computing apply. What's more, without autonomy, the literature suggests honeypots and honeynets will not be able to escape from under the administration and maintenance burden [1,39,25]. Such goes hand in hand with the positive upwards trend towards ML integration we observed.…”
Section: Open Challengesmentioning
confidence: 71%
“…The initial breakaway from traditional or static honeypots and honeynets comes in the form of dynamic honey systems. According to the research [23,24,25], the term dynamic describes the ability for the honeypot or honeynet system to adapt based on changes in the system architectures surrounding it. Importantly, the honeypot or honeynet adopts the responsibility for probing the architecture detect changes.…”
Section: Dynamicmentioning
confidence: 99%
“…This problem also exists in the proposal made by B. Park [20], but this proposal only generates a new honeypot when a new attack is detected. S. Kyung et al [21] presented a newer version of HoneyMix, which is called HoneyProxy.…”
Section: Honeypot System In Sdnfv-based Networkmentioning
confidence: 99%
“…The time from when the attacker starts attacking until when the attacker receives a response from the victim is referred to as response time. We calculated the response time and compared it with the results of most related works (DVNH) [20], and the results are depicted in Figure 8. DVNH needs 19 seconds to generate a new honeypot and connect it to the attacker, whereas our system needs only 13.551 seconds.…”
Section: Response Time Evaluationmentioning
confidence: 99%