A Graph Theory Based Self-Learning Honeypot to Detect Persistent Threats  

在线阅读下载全文

作  者:R.T.Pavendan K.Sankar K.A.Varun Kumar 

机构地区:[1]Department of Mathematics,College of Engineering,Anna University,Chennai,600025,India [2]Department of Networking and Communications,School of Computing,SRM Institute of Science and Technology,Kattankulathur,602203,India

出  处:《Intelligent Automation & Soft Computing》2023年第3期3331-3348,共18页智能自动化与软计算(英文)

摘  要:Attacks on the cyber space is getting exponential in recent times.Illegal penetrations and breaches are real threats to the individuals and organizations.Conventional security systems are good enough to detect the known threats but when it comes to Advanced Persistent Threats(APTs)they fails.These APTs are targeted,more sophisticated and very persistent and incorporates lot of evasive techniques to bypass the existing defenses.Hence,there is a need for an effective defense system that can achieve a complete reliance of security.To address the above-mentioned issues,this paper proposes a novel honeypot system that tracks the anonymous behavior of the APT threats.The key idea of honeypot leverages the concepts of graph theory to detect such targeted attacks.The proposed honey-pot is self-realizing,strategic assisted which withholds the APTs actionable tech-niques and observes the behavior for analysis and modelling.The proposed graph theory based self learning honeypot using the resultsγ(C(n,1)),γc(C(n,1)),γsc(C(n,1))outperforms traditional techniques by detecting APTs behavioral with detection rate of 96%.

关 键 词:Graph theory DOMINATION Connected Domination Secure Connected Domination HONEYPOT self learning ransomware 

分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象