Loading...
A mathematical model for analyzing honeynets and their cyber deception techniques
Javadpour, A ; Sharif University of Technology | 2023
0
Viewed
- Type of Document: Article
- DOI: 10.1109/ICECCS59891.2023.00019
- Publisher: Institute of Electrical and Electronics Engineers Inc , 2023
- Abstract:
- As a way of obtaining useful information about the adversaries behavior with a low rate of false detection, honeypots have made significant advancements in the field of cybersecurity. They are also powerful in wasting the adversaries resources and attracting their attention from other critical assets in the network. A deceptive network with multiple honeypots is called a honeynet. The honeypots in a honeynet aim to cooperate in order to increase their deception power. Professional adversaries utilize strong detection mechanisms to discover the existence of the honeypots in a network. When an adversary finds that a deception mechanism is deployed, it may change their behavior and cause malicious effects on the network. Therefore, a honeynet has to be deceptive enough in order not to be identified. This paper aims to review the techniques that are designed for the honeynets to make them improve their deception performance. The recent related surveys do not focus on the honeynet-specific techniques, and also have no comparison analysis. The main presented techniques in this paper are fully investigated through comparative analysis and simulation scenarios. Some suggestions on the research gap are also provided. The results of this paper can be used by the honeynet developers and researchers to improve their work. © 2023 IEEE
- Keywords:
- Deception performance ; Honeynet efficiency ; Honeypot deployment ; Network security ; Professional adversary
- Source: Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS ; 2023 , Pages 81-88 ; 27708527 (ISSN); 979-835034004-4 (ISBN)
- URL: https://ieeexplore.ieee.org/document/10321940