An active intrusion-confronting method using fake session and Honeypot 


Vol. 29,  No. 7, pp. 971-984, Jul.  2004


PDF
  Abstract

In the coming age of information warfare, information security patterns need to be changed such as to the active approach using offensive security mechanisms rather than traditional passive approach just protecting the intrusions. In an active security environment, it is essential that, when detecting an intrusion, the immediate confrontation such as analysing the intrusion situation in realtime, protecting information from the attacks, and even tracing the intruder. This paper presents an active int견ion-confronting system using a fake session and a honeypot. Through the fake session, the attacks like Dos(Denial of Service) and port scan can be intercepted. By monitoring honeypot system, in which the intruders are migrated from the protected system and an intrusion rule manager is being activated, new intrusion rules are created and activated for confronting the next intrusions.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

M. Lee, K. Shin, C. Park, "An active intrusion-confronting method using fake session and Honeypot," The Journal of Korean Institute of Communications and Information Sciences, vol. 29, no. 7, pp. 971-984, 2004. DOI: .

[ACM Style]

Myung-Sub Lee, Kyung-Chul Shin, and Chang-Hyeon Park. 2004. An active intrusion-confronting method using fake session and Honeypot. The Journal of Korean Institute of Communications and Information Sciences, 29, 7, (2004), 971-984. DOI: .

[KICS Style]

Myung-Sub Lee, Kyung-Chul Shin, Chang-Hyeon Park, "An active intrusion-confronting method using fake session and Honeypot," The Journal of Korean Institute of Communications and Information Sciences, vol. 29, no. 7, pp. 971-984, 7. 2004.