Vigilant Dynamic Honeypot Assisted by Dynamic Fuzzy Rule Interpolation
Title | Vigilant Dynamic Honeypot Assisted by Dynamic Fuzzy Rule Interpolation |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Naik, N., Shang, C., Shen, Q., Jenkins, P. |
Conference Name | 2018 IEEE Symposium Series on Computational Intelligence (SSCI) |
Date Published | nov |
ISBN Number | 978-1-5386-9276-9 |
Keywords | ARP Spoofing, attack identification, Communication networks, composability, computer network security, D-FRI, Dynamic Fuzzy Rule Interpolation, Dynamic Networks and Security, Dynamical Systems, Fuzzy logic, fuzzy systems, interpolation, IP networks, IP spoofing, knowledge based systems, Metrics, Network security, primary security tool, pubcrawl, Resiliency, security, security attacks, security of data, spoofing attack, Tools, vigilant dynamic honeypot |
Abstract | Dynamic Fuzzy Rule Interpolation (D-FRI) offers a dynamic rule base for fuzzy systems which is especially useful for systems with changing requirements and limited prior knowledge. This suggests a possible application of D-FRI in the area of network security due to the volatility of the traffic. A honeypot is a valuable tool in the field of network security for baiting attackers and collecting their information. However, typically designed with fewer resources they are not considered as a primary security tool for use in network security. Consequently, such honeypots can be vulnerable to many security attacks. One such attack is a spoofing attack which can cause severe damage to the honeypot, making it inefficient. This paper presents a vigilant dynamic honeypot based on the D-FRI approach for use in predicting and alerting of spoofing attacks on the honeypot. First, it proposes a technique for spoofing attack identification based on the analysis of simulated attack data. Then, the paper employs the identification technique to develop a D-FRI based vigilant dynamic honeypot, allowing the honeypot to predict and alert that a spoofing attack is taking place in the absence of matching rules. The resulting system is capable of learning and maintaining a dynamic rule base for more accurate identification of potential spoofing attacks with respect to the changing traffic conditions of the network. |
URL | https://ieeexplore.ieee.org/document/8628775 |
DOI | 10.1109/SSCI.2018.8628775 |
Citation Key | naik_vigilant_2018 |
- IP spoofing
- vigilant dynamic honeypot
- tools
- spoofing attack
- security of data
- security attacks
- security
- Resiliency
- pubcrawl
- primary security tool
- network security
- Metrics
- knowledge based systems
- Dynamic Networks and Security
- IP networks
- interpolation
- fuzzy systems
- Fuzzy logic
- Dynamical Systems
- Dynamic Fuzzy Rule Interpolation
- D-FRI
- computer network security
- composability
- Communication networks
- attack identification
- ARP Spoofing