蜜罐覆盖优先级的应用网络威胁影响评分估计

Matej Kren, A. Kos, Urban Sedlar
{"title":"蜜罐覆盖优先级的应用网络威胁影响评分估计","authors":"Matej Kren, A. Kos, Urban Sedlar","doi":"10.1109/CoBCom55489.2022.9880757","DOIUrl":null,"url":null,"abstract":"Honeypots are one of the important mechanisms in cybersecurity; they represent resources that appear interesting to attackers - either computing resources or data - but are deployed with the sole purpose of studying the techniques and tools of the attackers themselves. As such they are an invaluable resource for detecting the attacks, tools, and for protecting the systems, and many novel domains of application exist. In this paper we present a metric for evaluating the attractiveness of new types of honeypots, that aims to strike a balance between attractiveness of the honeypot for attackers and the real-world popularity of the mimicked system, which is reflected in the usefulness of the collected data. The score is based on the vulnerability density, breach cost, effectiveness of countermeasures, the compliance index, and the size of the real-world install base of the application. A practical calculation is presented based on the proposed formula.","PeriodicalId":131597,"journal":{"name":"2022 International Conference on Broadband Communications for Next Generation Networks and Multimedia Applications (CoBCom)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Estimating Application Cyberthreat Impact Score for Honeypot Coverage Prioritization\",\"authors\":\"Matej Kren, A. Kos, Urban Sedlar\",\"doi\":\"10.1109/CoBCom55489.2022.9880757\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Honeypots are one of the important mechanisms in cybersecurity; they represent resources that appear interesting to attackers - either computing resources or data - but are deployed with the sole purpose of studying the techniques and tools of the attackers themselves. As such they are an invaluable resource for detecting the attacks, tools, and for protecting the systems, and many novel domains of application exist. In this paper we present a metric for evaluating the attractiveness of new types of honeypots, that aims to strike a balance between attractiveness of the honeypot for attackers and the real-world popularity of the mimicked system, which is reflected in the usefulness of the collected data. The score is based on the vulnerability density, breach cost, effectiveness of countermeasures, the compliance index, and the size of the real-world install base of the application. A practical calculation is presented based on the proposed formula.\",\"PeriodicalId\":131597,\"journal\":{\"name\":\"2022 International Conference on Broadband Communications for Next Generation Networks and Multimedia Applications (CoBCom)\",\"volume\":\"41 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-07-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Broadband Communications for Next Generation Networks and Multimedia Applications (CoBCom)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CoBCom55489.2022.9880757\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Broadband Communications for Next Generation Networks and Multimedia Applications (CoBCom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CoBCom55489.2022.9880757","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

蜜罐是网络安全的重要机制之一;它们代表攻击者感兴趣的资源——计算资源或数据——但部署的唯一目的是研究攻击者自己的技术和工具。因此,它们是检测攻击、工具和保护系统的宝贵资源,并且存在许多新的应用程序领域。在本文中,我们提出了一个评估新型蜜罐吸引力的指标,其目的是在蜜罐对攻击者的吸引力和模拟系统在现实世界中的受欢迎程度之间取得平衡,这反映在收集数据的有用性上。该分数基于漏洞密度、泄露成本、对策有效性、遵从性指数以及应用程序实际安装基础的大小。根据所提出的公式进行了实际计算。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Estimating Application Cyberthreat Impact Score for Honeypot Coverage Prioritization
Honeypots are one of the important mechanisms in cybersecurity; they represent resources that appear interesting to attackers - either computing resources or data - but are deployed with the sole purpose of studying the techniques and tools of the attackers themselves. As such they are an invaluable resource for detecting the attacks, tools, and for protecting the systems, and many novel domains of application exist. In this paper we present a metric for evaluating the attractiveness of new types of honeypots, that aims to strike a balance between attractiveness of the honeypot for attackers and the real-world popularity of the mimicked system, which is reflected in the usefulness of the collected data. The score is based on the vulnerability density, breach cost, effectiveness of countermeasures, the compliance index, and the size of the real-world install base of the application. A practical calculation is presented based on the proposed formula.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
NFC communication through metal AWG-Channel-Spacing: A New Software Tool to Calculate Accurate Channel Spacing of an AWG Optical Multiplexer/Demultiplexer Visible Light Technologies — Background, Principles, Current applications and future developments Visible Light Sensing for Recognising Human Postural Transitions An Optimal Solution for a Human Wrist Rotation Recognition System by Utilizing Visible Light Communication
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1