Search
  • 网站搜寻
亚洲知识产权资讯网为知识产权业界提供一个一站式网上交易平台,协助业界发掘知识产权贸易商机,并与环球知识产权业界建立联系。无论你是知识产权拥有者正在出售您的知识产权,或是制造商需要购买技术以提高操作效能,又或是知识产权配套服务供应商,你将会从本网站发掘到有用的知识产权贸易资讯。
返回搜索结果

Detecting Targeted Attacks Using Shadow Honeypots


总结

Lead Inventors: Angelos Keromytis, Ph.D.; Stylianos Sidiroglou; Kostas G. AnagnostakisProblem or Unmet Need:Intrusion Prevention Systems (IPSs) are used to detect and respond to attacks on or suspicious activity targeting IT resources. Since most IPSs are rule-based, they are limited to protecting against known attacks. There is a need for intrustion detection mechanisms capable of detecting previously unknown types of attacks to counter the increasingly frequent occurrence of zero-day attacks. Two such approaches are honeypots and anomaly detection systems (ADSs). While honeypots can detect automatic attackers such as scanning worms, they can fail to detect manual intrusions or topological and hit-list worms. Although ADSs can theoretically detect both kinds of attacks, they often are less accurate than other detection methods.This technology is a novel hybrid architecture that combines the best features of honeypots and ADSs. Anomaly detectors are used to monitor traffic to a protected network; suspicious traffic is directed to a shadow honeypot that contains an instance of a protected resource instrumented to detect potential attacks. Traffic deemed to be legitimate by the shadow honeypot is validated and transparently passed on to the protected resource, while attacks are caught by the honeypot and discarded. This technology can be fine-tuned to balance the trade-off between performance and risk.


技术优势

-- Despite the overhead of imposed by shadow honeypot processing, the overall impact on the protected system's performance is actually diminished by the ability to minimize the occurrence of false positive attack detections.


技术应用

-- The technology can be used to protect a variety of server and client applications such as the Apache web server and the Mozilla web browser.


详细技术说明

This technology is a novel hybrid architecture that combines the best features of honeypots and ADSs. Anomaly detectors are used to monitor traffic to a protected network; suspicious traffic is directed to a shadow honeypot that contains an ins...


国家/地区

美国

欲了解更多信息,请点击 这里
Business of IP Asia Forum
桌面版