Visible to the public Recommendation Method of Honeynet Trapping Component Based on LSTM

TitleRecommendation Method of Honeynet Trapping Component Based on LSTM
Publication TypeConference Paper
Year of Publication2021
AuthorsTao, Jing, Chen, A, Liu, Kai, Chen, Kailiang, Li, Fengyuan, Fu, Peng
Conference Name2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)
Date Publishedoct
KeywordsAnalytical models, attention mechanism, Big Data, Bridges, Computer hacking, data privacy, Hacker's interests, honeynet, Human Behavior, human factors, LSTM, Metrics, Network security, Pervasive Computing Security, Predictive models, pubcrawl, resilience, Resiliency, Scalability
AbstractWith the advancement of network physical social system (npss), a large amount of data privacy has become the targets of hacker attacks. Due to the complex and changeable attack methods of hackers, network security threats are becoming increasingly severe. As an important type of active defense, honeypots use the npss as a carrier to ensure the security of npss. However, traditional honeynet structures are relatively fixed, and it is difficult to trap hackers in a targeted manner. To bridge this gap, this paper proposes a recommendation method for LSTM prediction trap components based on attention mechanism. Its characteristic lies in the ability to predict hackers' attack interest, which increases the active trapping ability of honeynets. The experimental results show that the proposed prediction method can quickly and effectively predict the attacking behavior of hackers and promptly provide the trapping components that hackers are interested in.
DOI10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00159
Citation Keytao_recommendation_2021