Paper
7 March 2022 Mimic honeypot based on dual mimicry mechanism
Xiangyu Lu, Peng Yi, Youjun Bu, Bo Chen
Author Affiliations +
Proceedings Volume 12167, Third International Conference on Electronics and Communication; Network and Computer Technology (ECNCT 2021); 121670E (2022) https://doi.org/10.1117/12.2629089
Event: 2021 Third International Conference on Electronics and Communication, Network and Computer Technology, 2021, Harbin, China
Abstract
Active defense is currently a key technology to reverse the asymmetry of offensive and defense in cyberspace. Honeypots, as one of the active defense technologies, are deployed in the internal network to attract attackers’ attacks, consume the attackers’ energy, and discover the attackers’ attack methods and attack intent. But at the same time, if there are security loopholes in the honeypot itself, the honeypot becomes the entrance for the attacker to attack the intranet, which will harm the security of the intranet. In this paper, aiming at the virtual machine escape scenario in the honeypot system, based on the mimicry defense idea, a dual mimicry mechanism and the honeypot architecture under this mechanism are proposed. This mechanism uses the heterogeneity of the underlying virtualization platform to resist the escaping vulnerabilities of the virtualization platform, and achieves level heterogeneity through honeypots to attract attackers, which is conducive to the complete collection of attackers' attack behaviors. Finally, the security test and performance test were carried out through the web implementation of the mimic honeypot.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Xiangyu Lu, Peng Yi, Youjun Bu, and Bo Chen "Mimic honeypot based on dual mimicry mechanism", Proc. SPIE 12167, Third International Conference on Electronics and Communication; Network and Computer Technology (ECNCT 2021), 121670E (7 March 2022); https://doi.org/10.1117/12.2629089
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Defense and security

Information security

Network security

Defense technologies

Computer security

Operating systems

Databases

Back to Top