Architecture of the Honeypot System for Studying Targeted Attacks
Title | Architecture of the Honeypot System for Studying Targeted Attacks |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Polyakov, V. V., Lapin, S. A. |
Conference Name | 2018 XIV International Scientific-Technical Conference on Actual Problems of Electronics Instrument Engineering (APEIE) |
ISBN Number | 978-1-5386-7054-5 |
Keywords | Computer architecture, Computer crime, computer information, financial organizations, honey pots, honeypot system, Human Behavior, human factors, information resources, information security systems, Information systems, Malware, Organizations, organized criminal groups, pubcrawl, public domain software, resilience, Resiliency, Scalability, security of data, Servers, target attacks, targeted attacks, Task Analysis |
Abstract | Among the threats to information systems of state institutions, enterprises and financial organizations of particular importance are those originating from organized criminal groups that specialize in obtaining unauthorized access to the computer information protected by law. Criminal groups often possess a material base including financial, technical, human and other resources that allow to perform targeted attacks on information resources as secretly as possible. The principal features of such targeted attacks are the use of software created or modified specifically for use in illegal purposes with respect to specific organizations. Due to these circumstances, the detection of such attacks is quite difficult, and their prevention is even more complicated. In this regard, the task of identifying and analyzing such threats is very relevant. One effective way to solve it is to implement the Honeypot system, which allows to research the strategy and tactics of the attackers. In the present article, there is proposed the original architecture of the Honeypot system designed to study targeted attacks on information systems of criminogenic objects. The architectural design includes such basic elements as the functional component, the registrar of events occurring in the system and the protector. The key features of the proposed Honeypot system are considered, and the functional purpose of its main components is described. The proposed system can find its application in providing information security of institutions, organizations and enterprises, it can be used in the development of information security systems. |
URL | https://ieeexplore.ieee.org/document/8545323 |
DOI | 10.1109/APEIE.2018.8545323 |
Citation Key | polyakov_architecture_2018 |
- Organizations
- Task Analysis
- targeted attacks
- target attacks
- Servers
- security of data
- Scalability
- Resiliency
- resilience
- public domain software
- pubcrawl
- organized criminal groups
- computer architecture
- malware
- Information systems
- information security systems
- information resources
- Human Factors
- Human behavior
- honeypot system
- honey pots
- financial organizations
- computer information
- Computer crime