Title :
Improving deception in honeynet: Through data manipulation
Author :
Alese, B.K. ; Akingbola, R.A. ; Dahunsi, F.M. ; Adewale, O.S. ; Ogundele, T.J.
Author_Institution :
Comput. Sci. Dept., Fed. Univ. of Technol., Akure, Nigeria
Abstract :
Emergence of honeynet, which is a network of honeypots, has changed the phase of internet security and information gathering about intruders. In improving deception of the honeynet which in turn increases the workload of attackers, most honeynet deployments are geared towards improving on the deception deal by using MAC addresses, IP addresses and protocols on host machine. Attackers gain access to networks with different motives, this work focuses on attackers who aim for data theft, data insertion, data deletion and data modification This paper also includes data manipulation, a new component introduced by the users of these hosts. This data content contributes to improving deception by dynamically sorting, shuffling, updating, manipulating and mapping each last modified state of the data to a unique MAC/IP addresses of an intruder machine that modified the system.
Keywords :
IP networks; access protocols; computer network security; IP addresses; Internet security; MAC addresses; attacker workload; data content contributes; data deletion; data insertion; data modification; data theft; deception improvement; dynamic data manipulation; dynamic data mapping; dynamic data shuffling; dynamic data sorting; dynamic data update; honeynet deployments; honeypot network; host machine; information gathering; intruder machine; protocols; Educational institutions; IP networks; Internet; Monitoring; Organizations; Production; Servers; Network Security; data manipulation; data theft; deception; honeynet;
Conference_Titel :
Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for
Conference_Location :
London
DOI :
10.1109/ICITST.2014.7038805