We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

cs

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo ScienceWISE logo

Computer Science > Cryptography and Security

Title: An Adaptive Honeypot Configuration, Deployment and Maintenance Strategy

Abstract: Since honeypots first appeared as an advanced network security concept they suffer from poor deployment and maintenance strategies. State-of-the-Art deployment is a manual process in which the honeypot needs to be configured and maintained by a network administrator. In this paper we present a method for a dynamic honeypot configuration, deployment and maintenance strategy based on machine learning techniques. Our method features an identification mechanism for machines and devices in a network. These entities are analysed and clustered. Based on the clusters, honeypots are intelligently deployed in the network. The proposed method needs no configuration and maintenance and is therefore a major advantage for the honeypot technology in modern network security.
Subjects: Cryptography and Security (cs.CR)
Cite as: arXiv:2111.03884 [cs.CR]
  (or arXiv:2111.03884v1 [cs.CR] for this version)

Submission history

From: Daniel Fraunholz [view email]
[v1] Sat, 6 Nov 2021 13:37:19 GMT (379kb)

Link back to: arXiv, form interface, contact.