{"title":"基于Maya蜜罐的网络与应用层攻击检测与分析","authors":"Seema Sharma","doi":"10.1109/CONFLUENCE.2016.7508125","DOIUrl":null,"url":null,"abstract":"This paper discusses the usage of Deception as a strategy in network security and development of Java based honeypot that is named as “Maya”. For network deception, intruders are deliberately provided with hosts having one or more vulnerabilities. Honeypot is such a network deception tool that provides illusion to the attackers. Basic purpose of Honeypot is to get compromised in order to gather information about intruders and their attack methods. It could also be used to lure attacker and divert him from the actual network. “Maya” honeypot is Java based deception tool having emulated services (FTP etc), a Rule & Anomaly based intrusion detection engine and a web based administration cum monitoring tool.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"39 3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Detection and analysis of network & application layer attacks using Maya Honeypot\",\"authors\":\"Seema Sharma\",\"doi\":\"10.1109/CONFLUENCE.2016.7508125\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper discusses the usage of Deception as a strategy in network security and development of Java based honeypot that is named as “Maya”. For network deception, intruders are deliberately provided with hosts having one or more vulnerabilities. Honeypot is such a network deception tool that provides illusion to the attackers. Basic purpose of Honeypot is to get compromised in order to gather information about intruders and their attack methods. It could also be used to lure attacker and divert him from the actual network. “Maya” honeypot is Java based deception tool having emulated services (FTP etc), a Rule & Anomaly based intrusion detection engine and a web based administration cum monitoring tool.\",\"PeriodicalId\":299044,\"journal\":{\"name\":\"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)\",\"volume\":\"39 3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CONFLUENCE.2016.7508125\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONFLUENCE.2016.7508125","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detection and analysis of network & application layer attacks using Maya Honeypot
This paper discusses the usage of Deception as a strategy in network security and development of Java based honeypot that is named as “Maya”. For network deception, intruders are deliberately provided with hosts having one or more vulnerabilities. Honeypot is such a network deception tool that provides illusion to the attackers. Basic purpose of Honeypot is to get compromised in order to gather information about intruders and their attack methods. It could also be used to lure attacker and divert him from the actual network. “Maya” honeypot is Java based deception tool having emulated services (FTP etc), a Rule & Anomaly based intrusion detection engine and a web based administration cum monitoring tool.