Introduction, Classification and Implementation of Honeypots

Author(s):  
Miguel Jose Hernandez y Lopez ◽  
Carlos Francisco Lerma Resendez

This chapter discusses the basic aspects of Honeypots, how they are implemented in modern computer networks, as well as their practical uses and implementation in educational environments, providing the reader with the most important points regarding the main characteristics of Honeypots and Honeynets. Honeypots are defined as “closely monitored network decoys” that can be set by network administrators to deal with a wide variety of attacks and interact with users in different levels (Provos, 2004). The implementation of Honeypots provides an answer to a common question posted by the field of information security and forensics: How to dissect the elements that make up an attack against a computer system. The chapter will summarizes the different features and capabilities of Honeypots once they are set up in a production environment to clarify the elements that are needed to be configured in order for a Honeypot to accomplish its main tasks and in order for it to be considered an effective tool. The end of the chapter will shift towards the analysis of virtualization as an important tool that maximizes the practical use of Honeypots in controlled environments that are focused towards the study of attacks, responses and analysis methods.

10.28945/3186 ◽  
2008 ◽  
Author(s):  
Miguel Hernandez y Lopez ◽  
Carlos Francisco Lerma Reséndez

This paper deals with the basic aspects of Honeypots, their use in modem computer networks and their implementation in educational environments. Initially, the implementation of Honeypots solves a common problem of Information Security and Forensics: The dissection of the elements that make up an attack against a computer system. Next, the paper explains the different types and functions of Honeypots once they are implemented in a network in order to make a distinction in terms of what is needed for the Honeypot to do. Finally, the use of Honeypots in educational environments, its benefits and the use of virtualization technologies is discussed.


Author(s):  
Shao Ying Zhu ◽  
Gerald Schaefer

Computer networks have evolved dramatically in recent years and consequently qualified and experienced network administrators are highly sought after, which in turn has led to the development of specialised computer networking courses at many universities. In this chapter, the authors investigate the use of network simulation tools as an alternative to be employed in computer networking laboratories. Network simulation tools provide students with the opportunity to freely experiment with virtual computer networks and equipment without the expensive costs associated with real networking hardware. The results of their research show that students appreciate the use of network simulators and see them as an effective approach to learning computer networking concepts and gaining the relevant experience. This was also confirmed by the actual performance of students who experienced different levels of exposure to networks simulators during their studies. The authors furthermore investigate the use of interactive, electronically assessed lab sessions, where students get immediate and interactive feedback while they are going through lab exercises. Their research shows that this approach not only releases the lecturer from less demanding students to better support weaker students, but that this will also lead to improved student performance and better student retention.


2011 ◽  
Vol 48 (No. 1) ◽  
pp. 20-26
Author(s):  
M. Birkás ◽  
T. Szalai ◽  
C. Gyuricza ◽  
M. Gecse ◽  
K. Bordás

This research was instigated by the fact that during the last decade annually repeated shallow disk tillage on the same field became frequent practice in Hungary. In order to study the changes of soil condition associated with disk tillage and to assess it is consequences, long-term tillage field experiments with different levels of nutrients were set up in 1991 (A) and in 1994 (B) on Chromic Luvisol at Gödöllö. The effects of disk tillage (D) and disk tillage combined with loosening (LD) on soil condition, on yield of maize and winter wheat, and on weed infestation were examined. The evaluation of soil condition measured by cone index and bulk density indicated that use of disking annually resulted in a dense soil layer below the disking depth (diskpan-compaction). It was found, that soil condition deteriorated by diskpan-compaction decreased the yield of maize significantly by 20 and 42% (w/w), and that of wheat by 13 and 15% (w/w) when compared to soils with no diskpan-compaction. Averaged over seven years, and three fertilizer levels, the cover % of the total, grass and perennial weeds on loosened soils were 73, 69 and 65% of soils contained diskpan-compaction.


2021 ◽  
pp. 263208432110100
Author(s):  
Satyendra Nath Chakrabartty

Background Scales for evaluating insomnia differ in number of items, response format, and result in different scores distributions and score ranges and may not facilitate meaningful comparisons. Objectives Transform ordinal item-scores of three scales of insomnia to continuous, equidistant, monotonic, normally distributed scores, avoiding limitations of summative scoring of Likert scales. Methods Equidistant item-scores by weighted sum using data-driven weights to different levels of different items, considering cell frequencies of Item-Levels matrix, followed by normalization and conversion to [1, 10]. Equivalent test-scores (as sum of transformed item- scores) for a pair of scales were found by Normal Probability curves. Empirical illustration given. Results Transformed test-scores are continuous, monotonic and followed Normal distribution with no outliers and tied scores. Such test-scores facilitate ranking, better classification and meaningful comparison of scales of different lengths and formats and finding equivalent score combinations of two scales. For a given value of transformed test-score of a scale, easy alternate method avoiding integration proposed to find equivalent scores of another scales. Equivalent scores of scales help to relate various cut-off scores of different scales and uniformity in interpretations. Integration of various scales of insomnia is achieved by finding one-to-one correspondence among the equivalent score of various scales with correlation over 0.99 Conclusion Resultant test-scores facilitated undertaking analysis in parametric set up. Considering the theoretical advantages including meaningfulness of operations, better comparison, use of such method of transforming scores of Likert items/test is recommended test and items, Future studies were suggested.


2021 ◽  
Vol 22 (15) ◽  
pp. 7901
Author(s):  
Luca Scaccini ◽  
Roberta Mezzena ◽  
Alessia De Masi ◽  
Mariacristina Gagliardi ◽  
Giovanna Gambarotta ◽  
...  

Peripheral nerve injuries are a common condition in which a nerve is damaged, affecting more than one million people every year. There are still no efficient therapeutic treatments for these injuries. Artificial scaffolds can offer new opportunities for nerve regeneration applications; in this framework, chitosan is emerging as a promising biomaterial. Here, we set up a simple and effective method for the production of micro-structured chitosan films by solvent casting, with high fidelity in the micro-pattern reproducibility. Three types of chitosan directional micro-grooved patterns, presenting different levels of symmetricity, were developed for application in nerve regenerative medicine: gratings (GR), isosceles triangles (ISO) and scalene triangles (SCA). The directional patterns were tested with a Schwann cell line. The most asymmetric topography (SCA), although it polarized the cell shaping less efficiently, promoted higher cell proliferation and a faster cell migration, both individually and collectively, with a higher directional persistence of motion. Overall, the use of micro-structured asymmetrical directional topographies may be exploited to enhance the nerve regeneration process mediated by chitosan scaffolds.


2014 ◽  
Vol 701-702 ◽  
pp. 919-922
Author(s):  
Hong Fei Xu ◽  
Si Rui Pang ◽  
Jian Wen Du ◽  
Xue Mei Li

A system includes three power information security defense line is constructed, to achieve the information network, information outside the network, scheduling data network depth protection. According to the information security protection requirements, starting from the overall structure of information systems, taking into account the information system to schedule production system as the core, based on independent research and development of core information security isolation unit, set up three lines of defense in the power of information systems, electricity secondary system, information network systems, information systems outside the network partition protection.


2016 ◽  
Vol 44 (3) ◽  
pp. 377-391 ◽  
Author(s):  
Azadeh Esfandyari ◽  
Matteo Zignani ◽  
Sabrina Gaito ◽  
Gian Paolo Rossi

To take advantage of the full range of services that online social networks (OSNs) offer, people commonly open several accounts on diverse OSNs where they leave lots of different types of profile information. The integration of these pieces of information from various sources can be achieved by identifying individuals across social networks. In this article, we address the problem of user identification by treating it as a classification task. Relying on common public attributes available through the official application programming interface (API) of social networks, we propose different methods for building negative instances that go beyond usual random selection so as to investigate the effectiveness of each method in training the classifier. Two test sets with different levels of discrimination are set up to evaluate the robustness of our different classifiers. The effectiveness of the approach is measured in real conditions by matching profiles gathered from Google+, Facebook and Twitter.


2018 ◽  
Vol 7 (2) ◽  
pp. 61-67
Author(s):  
Iga Revva Princiss Jeinever

Computer networks are basically not safe to access freely. Security gaps in the network can be seen by irresponsible people with various techniques. Opening a port for access carries a high risk of being attacked by an attacker. In this connection, network administrators are required to work more to be able to secure the computer network they manage. One form of network security that is often used by network administrators in server management is through remote login such as ports on telnet, SSH, etc. A port that is always open is a network security hole that can be used by people who are not responsible for logging into the server. Focusing on these problems, in this study, Random Port Knocking is the right way and can be used to increase network security. With Random Port Knocking, the port will be opened as needed, the port will automatically change when it fails to log in more than three times and IP will automatically be blocked and access will not continue so that attacks on the network can be avoided and network security stability can be further improved. The final result of this research shows that the method applied in this research makes server safe. Because port randomization and IP block make irresponsible parties try harder to penetrate firewall walls.


2022 ◽  
Vol 1 (13) ◽  
pp. 80-92
Author(s):  
Nguyễn Mạnh Thiên ◽  
Phạm Đăng Khoa ◽  
Nguyễn Đức Vượng ◽  
Nguyễn Việt Hùng

Tóm tắt—Hiện nay, nhiệm vụ đánh giá an toàn thông tin cho các hệ thống thông tin có ý nghĩa quan trọng trong đảm bảo an toàn thông tin. Đánh giá/khai thác lỗ hổng bảo mật cần được thực hiện thường xuyên và ở nhiều cấp độ khác nhau đối với các hệ thống thông tin. Tuy nhiên, nhiệm vụ này đang gặp nhiều khó khăn trong triển khai diện rộng do thiếu hụt đội ngũ chuyên gia kiểm thử chất lượng ở các cấp độ khác nhau. Trong khuôn khổ bài báo này, chúng tôi trình bày nghiên cứu phát triển Framework có khả năng tự động trinh sát thông tin và tự động lựa chọn các mã để tiến hành khai thác mục tiêu dựa trên công nghệ học tăng cường (Reinforcement Learning). Bên cạnh đó Framework còn có khả năng cập nhật nhanh các phương pháp khai thác lỗ hổng bảo mật mới, hỗ trợ tốt cho các cán bộ phụ trách hệ thống thông tin nhưng không phải là chuyên gia bảo mật có thể tự động đánh giá hệ thống của mình, nhằm giảm thiểu nguy cơ từ các cuộc tấn công mạng. Abstract—Currently, security assessment is one of the most important proplem in information security. Vulnerability assessment/exploitation should be performed regularly with different levels of complexity for each information system. However, this task is facing many difficulties in large-scale deployment due to the lack of experienced testing experts. In this paper, we proposed a Framework that can automatically gather information and automatically select suitable module to exploit the target based on reinforcement learning technology. Furthermore, our framework has intergrated many scanning tools, exploited tools that help pentesters doing their work. It also can be easily updated new vulnerabilities exploit techniques.


Sign in / Sign up

Export Citation Format

Share Document