{"title":"蜜罐覆盖优先级的应用网络威胁影响评分估计","authors":"Matej Kren, A. Kos, Urban Sedlar","doi":"10.1109/CoBCom55489.2022.9880757","DOIUrl":null,"url":null,"abstract":"Honeypots are one of the important mechanisms in cybersecurity; they represent resources that appear interesting to attackers - either computing resources or data - but are deployed with the sole purpose of studying the techniques and tools of the attackers themselves. As such they are an invaluable resource for detecting the attacks, tools, and for protecting the systems, and many novel domains of application exist. In this paper we present a metric for evaluating the attractiveness of new types of honeypots, that aims to strike a balance between attractiveness of the honeypot for attackers and the real-world popularity of the mimicked system, which is reflected in the usefulness of the collected data. The score is based on the vulnerability density, breach cost, effectiveness of countermeasures, the compliance index, and the size of the real-world install base of the application. A practical calculation is presented based on the proposed formula.","PeriodicalId":131597,"journal":{"name":"2022 International Conference on Broadband Communications for Next Generation Networks and Multimedia Applications (CoBCom)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Estimating Application Cyberthreat Impact Score for Honeypot Coverage Prioritization\",\"authors\":\"Matej Kren, A. Kos, Urban Sedlar\",\"doi\":\"10.1109/CoBCom55489.2022.9880757\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Honeypots are one of the important mechanisms in cybersecurity; they represent resources that appear interesting to attackers - either computing resources or data - but are deployed with the sole purpose of studying the techniques and tools of the attackers themselves. As such they are an invaluable resource for detecting the attacks, tools, and for protecting the systems, and many novel domains of application exist. In this paper we present a metric for evaluating the attractiveness of new types of honeypots, that aims to strike a balance between attractiveness of the honeypot for attackers and the real-world popularity of the mimicked system, which is reflected in the usefulness of the collected data. The score is based on the vulnerability density, breach cost, effectiveness of countermeasures, the compliance index, and the size of the real-world install base of the application. A practical calculation is presented based on the proposed formula.\",\"PeriodicalId\":131597,\"journal\":{\"name\":\"2022 International Conference on Broadband Communications for Next Generation Networks and Multimedia Applications (CoBCom)\",\"volume\":\"41 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-07-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Broadband Communications for Next Generation Networks and Multimedia Applications (CoBCom)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CoBCom55489.2022.9880757\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Broadband Communications for Next Generation Networks and Multimedia Applications (CoBCom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CoBCom55489.2022.9880757","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Estimating Application Cyberthreat Impact Score for Honeypot Coverage Prioritization
Honeypots are one of the important mechanisms in cybersecurity; they represent resources that appear interesting to attackers - either computing resources or data - but are deployed with the sole purpose of studying the techniques and tools of the attackers themselves. As such they are an invaluable resource for detecting the attacks, tools, and for protecting the systems, and many novel domains of application exist. In this paper we present a metric for evaluating the attractiveness of new types of honeypots, that aims to strike a balance between attractiveness of the honeypot for attackers and the real-world popularity of the mimicked system, which is reflected in the usefulness of the collected data. The score is based on the vulnerability density, breach cost, effectiveness of countermeasures, the compliance index, and the size of the real-world install base of the application. A practical calculation is presented based on the proposed formula.