TY - JOUR
T1 - Versatile virtual honeynet management framework
AU - Fan, Wenjun
AU - Fernández, David
AU - Du, Zhihui
N1 - Publisher Copyright:
© The Institution of Engineering and Technology 2016.
PY - 2017/1/1
Y1 - 2017/1/1
N2 - Honeypots are designed to investigate malicious behaviour. Each type of homogeneous honeypot system has its own characteristics in respect of specific security functionality, and also suffers functional drawbacks that restrict its application scenario. In practical scenarios, therefore, security researchers always need to apply heterogeneous honeypots to cope with different attacks. However, there is a lack of general tools or platforms that can support versatile honeynet deployment in order to investigate the malicious behavior. In this study, the authors propose a versatile virtual honeynet management tool to address this problem. It is a flexible tool that offers security researchers the versatility to deploy various types of honeypots. It can also generate and manage the virtual honeynet through a dynamic configuration approach adapting to the mutable network environment. The experimental results demonstrate that this tool is effective to perform automated honeynet deployment toward a variety of heterogeneous honeypots.
AB - Honeypots are designed to investigate malicious behaviour. Each type of homogeneous honeypot system has its own characteristics in respect of specific security functionality, and also suffers functional drawbacks that restrict its application scenario. In practical scenarios, therefore, security researchers always need to apply heterogeneous honeypots to cope with different attacks. However, there is a lack of general tools or platforms that can support versatile honeynet deployment in order to investigate the malicious behavior. In this study, the authors propose a versatile virtual honeynet management tool to address this problem. It is a flexible tool that offers security researchers the versatility to deploy various types of honeypots. It can also generate and manage the virtual honeynet through a dynamic configuration approach adapting to the mutable network environment. The experimental results demonstrate that this tool is effective to perform automated honeynet deployment toward a variety of heterogeneous honeypots.
UR - http://www.scopus.com/inward/record.url?scp=85009432117&partnerID=8YFLogxK
U2 - 10.1049/iet-ifs.2015.0256
DO - 10.1049/iet-ifs.2015.0256
M3 - Article
AN - SCOPUS:85009432117
SN - 1751-8709
VL - 11
SP - 38
EP - 45
JO - IET Information Security
JF - IET Information Security
IS - 1
ER -