Honeypot Frameworks and Their Applications: A New Framework -  Chee Keong NG,  Lei Pan,  Yang Xiang

Honeypot Frameworks and Their Applications: A New Framework (eBook)

eBook Download: PDF
2018 | 1. Auflage
XII, 88 Seiten
Springer Singapore (Verlag)
978-981-10-7739-5 (ISBN)
Systemvoraussetzungen
64,19 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book presents the latest research on honeypots and their applications. After introducing readers to the basic concepts of honeypots and common types, it reviews various honeypot frameworks such as web-server-based, client-based, shadow and artificially intelligent honeypots. In addition, it offers extensive information on the contribution of honeypots in some of the most popular malware research area such as DDoS, Worm, APT, forensics and Bot attacks.

The book subsequently tackles the issue of honeypot countermeasures, shows many of the tricks often used by hackers to discover honeypots, and proposes a counter-countermeasure to help conceal them. It then puts forward a new framework that integrates various novel concepts, and which can feasibly be used for the detection of potential ransomware and bitcoin. As such, the book provides non-experts with a concise guide to honeypots, and will also benefit practitioners working on security systems.



Chee Keong NG completed his Master of IT at Deakin University, Australia. He is now pursuing his PHD in Philosophy (IT). His research interests include honeypots, ransomware and deep learning.

Dr Lei Pan received his Ph.D. in Computer Forensics from Deakin University, Melbourne, Australia, in 2008. He currently teaches at Deakin University, Burwood, Victoria, Australia, where he offers courses on cybersecurity. His research interests include cybersecurity and privacy, software security testing, and the applications of analytics in security and privacy. He is also an active cybersecurity educator on futurelearn.com.

Professor Yang Xiang received his PhD in Computer Science from Deakin University, Australia and is currently the Dean of the Digital Research & Innovation Capability Platform at Swinburne University of Technology, Australia. His research interests include network and system security, data analytics, distributed systems, and networking. Further, he is a Senior Member of the IEEE.
This book presents the latest research on honeypots and their applications. After introducing readers to the basic concepts of honeypots and common types, it reviews various honeypot frameworks such as web-server-based, client-based, shadow and artificially intelligent honeypots. In addition, it offers extensive information on the contribution of honeypots in some of the most popular malware research area such as DDoS, Worm, APT, forensics and Bot attacks. The book subsequently tackles the issue of honeypot countermeasures, shows many of the tricks often used by hackers to discover honeypots, and proposes a counter-countermeasure to help conceal them. It then puts forward a new framework that integrates various novel concepts, and which can feasibly be used for the detection of potential ransomware and bitcoin. As such, the book provides non-experts with a concise guide to honeypots, and will also benefit practitioners working on security systems.

Chee Keong NG completed his Master of IT at Deakin University, Australia. He is now pursuing his PHD in Philosophy (IT). His research interests include honeypots, ransomware and deep learning. Dr Lei Pan received his Ph.D. in Computer Forensics from Deakin University, Melbourne, Australia, in 2008. He currently teaches at Deakin University, Burwood, Victoria, Australia, where he offers courses on cybersecurity. His research interests include cybersecurity and privacy, software security testing, and the applications of analytics in security and privacy. He is also an active cybersecurity educator on futurelearn.com. Professor Yang Xiang received his PhD in Computer Science from Deakin University, Australia and is currently the Dean of the Digital Research & Innovation Capability Platform at Swinburne University of Technology, Australia. His research interests include network and system security, data analytics, distributed systems, and networking. Further, he is a Senior Member of the IEEE.

Preface 7
Acknowledgements 8
Contents 9
1 Introduction to Honeypot 11
1.1 Introduction 11
References 13
2 Design Honeypots 16
2.1 The Concept of Honeypot (Basic Taxonomy) 16
2.2 Advanced Taxonomy of Honeypot 19
2.3 Roadmap of the Honeypot Concept 20
2.4 Challenges in Designing Honeypot 20
References 22
3 Specialized Honeypot Applications 23
3.1 Web-Server Based Honeypot 23
3.2 Web Client-Based Honeypot 26
3.3 Worm Detection Honeypot 29
3.4 Bot Detection Honeypot 33
3.5 Honeytoken 37
3.5.1 Anti-phishing Honeypot 37
3.5.2 Insider Detection Honeypot 40
3.6 Advanced Persistent Threat Honeypot 44
References 47
4 General Purposed Honeypot Applications 50
4.1 Dynamic Honeypot 50
4.2 Artificial Intelligent Honeypot 54
4.3 Shadow Honeypot 55
References 57
5 Other Honeypot Applications 58
5.1 Concealment of Honeypot 58
5.2 Application of Forensic in Honeypot 60
5.2.1 Honeypot Forensic for General Type Attack 62
5.2.2 Honeypot Forensics for Botnet 69
5.3 Direct Role of Honeypot in a Security System 71
References 72
6 Honeypot Framework, Limitation and Counter-Measure 74
6.1 Conceptual Framework 74
6.2 Common Features of Honeypot 76
6.3 Other Honeypot Detection Method 78
References 80
7 Ramsonware and Honeypot 82
7.1 Ransomware 82
7.2 Ransomware Honeypot 83
7.3 Bitcoin Honeytoken 84
References 84
8 Conclusions and Future Work 86
8.1 Conclusion 86
8.1.1 Summary 86
8.1.2 Future Research Work 88

Erscheint lt. Verlag 8.5.2018
Reihe/Serie SpringerBriefs on Cyber Security Systems and Networks
Zusatzinfo XII, 81 p. 5 illus. in color.
Verlagsort Singapore
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Theorie / Studium
Informatik Weitere Themen Hardware
Mathematik / Informatik Mathematik Angewandte Mathematik
Mathematik / Informatik Mathematik Graphentheorie
Naturwissenschaften Physik / Astronomie
Technik
Schlagworte anti-monitoring • Bitcoin • botmaster • circumvent • Crawler • honeypot • Monitoring • P2P Botnets • ransmware • Sensor
ISBN-10 981-10-7739-8 / 9811077398
ISBN-13 978-981-10-7739-5 / 9789811077395
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 1,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90