Detecting and Analyzing Zero-Day Attacks Using Honeypots

Computer networks are overwhelmed by self propagating malware (worms, viruses, trojans). Although the number of security vulnerabilities grows every day, not the same thing can be said about the number of defense methods. But the most delicate problem in the information security domain remains detec...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2013 19th International Conference on Control Systems and Computer Science s. 543 - 548
Hlavní autoři: Musca, Constantin, Mirica, Emma, Deaconescu, Razvan
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 01.05.2013
Témata:
ISBN:9781467361408, 1467361402
ISSN:2379-0474
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:Computer networks are overwhelmed by self propagating malware (worms, viruses, trojans). Although the number of security vulnerabilities grows every day, not the same thing can be said about the number of defense methods. But the most delicate problem in the information security domain remains detecting unknown attacks known as zero-day attacks. This paper presents methods for isolating the malicious traffic by using a honeypot system and analyzing it in order to automatically generate attack signatures for the Snort intrusion detection/prevention system. The honeypot is deployed as a virtual machine and its job is to log as much information as it can about the attacks. Then, using a protected machine, the logs are collected remotely, through a safe connection, for analysis. The challenge is to mitigate the risk we are exposed to and at the same time search for unknown attacks.
ISBN:9781467361408
1467361402
ISSN:2379-0474
DOI:10.1109/CSCS.2013.94