首页> 外文期刊>Computers & Security >Expert system assessing threat level of attacks on a hybrid SSH honeynet
【24h】

Expert system assessing threat level of attacks on a hybrid SSH honeynet

机译:专家系统评估混合SSH蜜网攻击的威胁级别

获取原文
获取原文并翻译 | 示例
           

摘要

Currently, many systems connected to the internet are exposed to hundreds of mostly automated network attacks on a daily basis. These are mostly very simple attacks originating from botnets. However, sophisticated attacks conducted both by automated systems and directly by humans are becoming more common. In order to develop adequate countermeasures, the behaviour of attackers has to be analysed effectively. Honeypots, a sort of lures for the attacks, are used for that purpose. Configuration of honey-pots vary depending on the type of attacks they focus on attracting. For simple, analogous attacks that sequentially repeat predefined commands, medium interaction honeypots are sufficient, while more sophisticated attacks require the use of high interactive honeypots. An essential part of the analysis is to differentiate between these types of attacks to make the overall analysis efficient, in terms of efficient use of hardware resources, and effective by providing the attacker with an appropriately emulated environment. This article first analyses the current situation followed by presenting a solution in the form of a system made up of a hybrid honeynet and an expert system. For now, it focuses only on the SSH protocol, as it is widely used for remote system access and is a popular target of attacks. The system has been tested on real data collected over a one-year period. The article also deals with making redirecting SSH connections as transparent as possible.
机译:当前,许多连接到Internet的系统每天都会遭受数百种大多数是自动化的网络攻击。这些大多是来自僵尸网络的非常简单的攻击。但是,由自动化系统和直接由人类进行的复杂攻击正变得越来越普遍。为了制定适当的对策,必须有效分析攻击者的行为。蜜罐是一种用于攻击的诱饵,用于此目的。蜜罐的配置取决于它们重点吸引的攻击类型。对于顺序重复执行预定义命令的简单类似攻击,中等交互蜜罐就足够了,而更复杂的攻击则需要使用高交互蜜罐。分析的重要部分是区分这些类型的攻击,以使整体分析高效(就有效利用硬件资源而言),并通过向攻击者提供适当模拟的环境来使其有效。本文首先分析了当前情况,然后以由混合蜜网和专家系统组成的系统的形式提出了一种解决方案。目前,它仅专注于SSH协议,因为它广泛用于远程系统访问,并且是攻击的流行目标。该系统已经过一年的真实数据测试。本文还讨论了使重定向SSH连接尽可能透明的问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号