Document Type : Original Research Paper
Authors
Department of Computer Engineering, Dezful Branch, Islamic Azad University, Dezful, Iran
Abstract
Background and Objectives: Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks.
Methods: A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’ information and trap them. By using a vulnerable scanner in this paper, we obtained the required network vulnerabilities and normalized them via the proposed method. Then, a dynamic hybrid honeypot has proposed by high and low interaction honeypots. Also, in the proposed method, by footprinting and scanning of an integrated network, a detailed picture of the production network and a honeypot configuration file are generated.
Results: As a result, more devices could be detected via automated production by the proposed method.
Conclusion: This method could accelerate honeypot production and reduce the users’ mistakes during their manual production. Monitoring network traffic, collecting the information of network machines, determining network operating systems, and storing data in a database are the specific features of this system that could be performed by using the selected network scanning tools and modules.
======================================================================================================
Copyrights
©2019 The author(s). This is an open access article distributed under the terms of the Creative Commons Attribution (CC BY 4.0), which permits unrestricted use, distribution, and reproduction in any medium, as long as the original authors and source are cited. No permission is required from the authors or the publishers.
======================================================================================================
Keywords
Main Subjects
[3] L. Spitzner, Honeypots: tracking hackers, Addison Wesley Professional, 1: 2002.
[11] R. Danford, 2nd Generation Honeyclients, SANS Internet Storm Center, 2006.
[16] ‘The Xen Hypervisor,’December 2019.
[17] F. Bellard, “QEMU-open source processor emulator,” 14 November 2019.
[18] ‘VMware”, 01 October 2018.
[20] R. Baumann, C. Plattner, Honeypots, Swiss Federal Institute of Technology, 2002.
Send comment about this article