学位论文详细信息
Scalable framework for turn-key honeynet deployment
Honeynet;Cloud computing;Information security
Brzeczko, Albert Walter ; Copeland, John A. Electrical and Computer Engineering Owen, Henry Beyah, Raheem Riley, George Chau, Duen Horng (Polo) ; Copeland, John A.
University:Georgia Institute of Technology
Department:Electrical and Computer Engineering
关键词: Honeynet;    Cloud computing;    Information security;   
Others  :  https://smartech.gatech.edu/bitstream/1853/51842/1/BRZECZKO-DISSERTATION-2014.pdf
美国|英语
来源: SMARTech Repository
PDF
【 摘 要 】

Enterprise networks present very high value targets in the eyes of maliciousactors who seek to exfiltrate sensitive proprietary data, disrupt the operations of a particular organization, or leverage considerable computational and network resources to further their own illicit goals. For this reason, enterprise networks typically attract the most determined of attackers. These attackers are prone to using the most novel and difficult-to-detect approaches so that they may have a high probability of success and continue operating undetected. Many existing network security approaches that fall under the category of intrusion detection systems (IDS) and intrusion prevention systems (IPS) are able to detect classes of attacks that are well-known. While these approaches are effective for filtering out routine attacks in automated fashion, they are ill-suited for detecting the types of novel tactics and zero-day exploits that are increasingly used against the enterprise.In this thesis, a solution is presented that augments existing security measures to provide enhanced coverage of novel attacks in conjunction with what is already provided by traditional IDS and IPS. The approach enables honeypots, a class of tech- nique that observes novel attacks by luring an attacker to perform malicious activity on a system having no production value, to be deployed in a turn-key fashion and at large scale on enterprise networks. In spite of the honeypot’s efficacy against tar- geted attacks, organizations can seldom afford to devote capital and IT manpower to integrating them into their security posture. Furthermore, misconfigured honeypots can actually weaken an organization’s security posture by giving the attacker a stag- ing ground on which to perform further attacks. A turn-key approach is needed for organizations to use honeypots to trap, observe, and mitigate novel targeted attacks.

【 预 览 】
附件列表
Files Size Format View
Scalable framework for turn-key honeynet deployment 1948KB PDF download
  文献评价指标  
  下载次数:13次 浏览次数:23次