Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2022

01-12-2022

Counteracting Information Threats Using Honeypot Systems Based on a Graph of Potential Attacks

Authors: E. V. Zavadskii, D. V. Ivanov

Published in: Automatic Control and Computer Sciences | Issue 8/2022

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A method for the dynamic control of resources of a honeypot system based on the graph of potential attacks is proposed to allow for the deployment of a virtual network infrastructure of any scale, according to which, under the conditions of limited computational resources, the virtual network infrastructure varies its configuration, adapting to the actions of an intruder.
Literature
1.
go back to reference NIST National Vulnerability Database Statistics Results. https://nvd.nist.gov/vuln/search/statistics?form_ type=Basic&results_type=statistics&search_type=all. Cited January 15, 2021. NIST National Vulnerability Database Statistics Results. https://​nvd.​nist.​gov/​vuln/​search/​statistics?​form_​ type=Basic&results_type=statistics&search_type=all. Cited January 15, 2021.
2.
go back to reference External pentests. 2020. https://www.ptsecurity.com/ru-ru/research/analytics/external-pentests-2020/. Cited September 11, 2020. External pentests. 2020. https://​www.​ptsecurity.​com/​ru-ru/​research/​analytics/​external-pentests-2020/​.​ Cited September 11, 2020.
5.
go back to reference Honeypot Argos. htps://www.few.vu.nl/argos/. Cited September 20, 2020. Honeypot Argos. htps://www.few.vu.nl/argos/. Cited September 20, 2020.
6.
go back to reference Talabis, R., Honeynets: A honeynet definition, The Philippine Honeypot Project, 2005, pp. 1–4. Talabis, R., Honeynets: A honeynet definition, The Philippine Honeypot Project, 2005, pp. 1–4.
7.
go back to reference Sharma, N. and Sran, S.S., Detection of threats in honeynet using honeywall, Int. J. Comput. Sci. Eng., 2011, vol. 3, no. 10, pp. 3332–3336. Sharma, N. and Sran, S.S., Detection of threats in honeynet using honeywall, Int. J. Comput. Sci. Eng., 2011, vol. 3, no. 10, pp. 3332–3336.
9.
go back to reference MITRE ATT&KE Lateral Movement. https://attack.mitre.org/tactics/TA0008/. Cited December 11, 2020. MITRE ATT&KE Lateral Movement. https://​attack.​mitre.​org/​tactics/​TA0008/​.​ Cited December 11, 2020.
Metadata
Title
Counteracting Information Threats Using Honeypot Systems Based on a Graph of Potential Attacks
Authors
E. V. Zavadskii
D. V. Ivanov
Publication date
01-12-2022
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 8/2022
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411622080260

Other articles of this Issue 8/2022

Automatic Control and Computer Sciences 8/2022 Go to the issue