Mobile Communication Security Defense Method Based on Honeypot Technology

Jia Xu, Yang Guo
{"title":"Mobile Communication Security Defense Method Based on Honeypot Technology","authors":"Jia Xu, Yang Guo","doi":"10.1109/ITCA52113.2020.00110","DOIUrl":null,"url":null,"abstract":"In the era of industrial Internet, the development trend of digitization, networking, and intelligence has made more and more industrial control equipment that are originally in a closed environment exposed to the public Internet, facing the threat of attacks from the Internet. Moreover, honeypot is a new type of active defense technology, which attracts hackers to launch attacks by disguising as devices and systems that seem to be valuable. After capturing and analyzing the attack behavior, it understands the attack tools and methods, and guesses the attacker’s intention and motivation. Based on the utilization of an unsupervised clustering algorithm, an information classification method is proposed in the paper. First, honeypots attack behaviors are captured with high and low interaction. Then, through redirection technology, normal access requests are forwarded to the real server for processing, and abnormal accesses are forwarded to the honeypot virtual machine to deal with. Finally, by selecting traditional tools for comparative testing, the experiment proves that the algorithm proposed in the paper can well defend and monitor as well as discover the behavior and information of the above attack events.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITCA52113.2020.00110","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In the era of industrial Internet, the development trend of digitization, networking, and intelligence has made more and more industrial control equipment that are originally in a closed environment exposed to the public Internet, facing the threat of attacks from the Internet. Moreover, honeypot is a new type of active defense technology, which attracts hackers to launch attacks by disguising as devices and systems that seem to be valuable. After capturing and analyzing the attack behavior, it understands the attack tools and methods, and guesses the attacker’s intention and motivation. Based on the utilization of an unsupervised clustering algorithm, an information classification method is proposed in the paper. First, honeypots attack behaviors are captured with high and low interaction. Then, through redirection technology, normal access requests are forwarded to the real server for processing, and abnormal accesses are forwarded to the honeypot virtual machine to deal with. Finally, by selecting traditional tools for comparative testing, the experiment proves that the algorithm proposed in the paper can well defend and monitor as well as discover the behavior and information of the above attack events.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于蜜罐技术的移动通信安全防御方法
在工业互联网时代,数字化、网络化、智能化的发展趋势,使得越来越多原本处于封闭环境的工控设备暴露在公共互联网中,面临来自互联网攻击的威胁。此外,蜜罐是一种新型的主动防御技术,它通过伪装成看起来有价值的设备和系统来吸引黑客发动攻击。通过对攻击行为的捕捉和分析,了解攻击工具和方法,猜测攻击者的意图和动机。本文在利用无监督聚类算法的基础上,提出了一种信息分类方法。首先,通过高低交互捕获蜜罐攻击行为。然后通过重定向技术,将正常的访问请求转发到实服务器进行处理,将异常的访问请求转发到蜜罐虚拟机进行处理。最后,通过选择传统工具进行对比测试,实验证明本文提出的算法能够很好地防御、监控和发现上述攻击事件的行为和信息。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Research on Physically-based Computer Animation Application and research of heuristic search algorithm in crawler field Application of Student achievement Analysis based on Apriori Algorithm A Robust Routing Algorithm with Dynamic Minimum Hop Selection in Wireless Sensor Networks with Unreliable Links Research on Formation Pressure Prediction Based on Neural Network System Identification Theory
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1