DOI QR코드

DOI QR Code

Prototype Design of Hornet Cloud using Virtual Honeypot Technique

가상 허니팟 기술의 호넷 클라우드의 프로타입 설계

  • 차병래 (광주과학기술원 정보통신공학과) ;
  • 박선 (광주과학기술원 정보통신공학과) ;
  • 김종원 (광주과학기술원 정보통신공학부)
  • Received : 2015.06.29
  • Accepted : 2015.08.23
  • Published : 2015.08.31

Abstract

Cloud Computing has recently begun to emerge as a new attack target. The malice DDoS attacks are ongoing to delay and disturb the various services of the Cloud Computing. In this paper, we propose the Hornet-Cloud using security Honeypot technique and resources of Cloud Computing, and design the concept of active-interaction and security functions of Hornet-Cloud simply.

최근 클라우드 컴퓨팅이 새로운 공격 대상으로 부상하기 시작했으며, 클라우드의 다양한 서비스를 지연 및 방해하기 위한 악의적인 DDoS 공격이 진행되고 있다. 본 논문에서는 허니팟 보안 기술과 클라우드 컴퓨팅의 자원을 이용한 호넷 클라우드를 제안하며, 간략하게 능동 상호동작의 개념과 보안 기능들을 설계한다.

Keywords

References

  1. J. Mirkovic and P. Reiher, "A taxonomy of DDoS attack and DDoS defence mechanisms," Association for Computing Machinery's Special Interest Group in communication and computer networks, Computer Communication Review, vol. 34, no. 2, Apr. 2004, pp. 39-53.
  2. M. M. Specht and R. B. Lee, "Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures," Proc. of the 17th Int. Conf. on Parallel and Distributed Computing Systems, 2004 Int. Workshop on Security in Parallel and Distributed Systems, Sep. 2004, pp. 543-550.
  3. C. V. Secau, "Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity," J. of Digital Forensics, Security and Law, vol. 5, no. 2, 2010, pp. 35-43.
  4. R. Carmo, M. Nassar, and O. Festor, "Artemisa: an Open-Source Honeypot Back-End to Support Security in VoIP Domains," 12th Int. Federation for Information Processing/IEEE Int. Symp. on Integrated Network Management 2011, May 2011, pp. 361-368.
  5. S. Brown, R. Lam, S. Prasad, S. Ramasubramanian, and J. Slauson, "Honypots in Cloud," M.S. thesis, University of Wisconsin-Madison, Dec. 2012, http://pages.cs.wisc.edu/-sbrown/downloads/honeypots-in-the-cloud.
  6. R. Ramya, "Securing the system using honeypot in cloud computing environment," International J. of Multidisciplinary Research and Development, vol. 2, no. 4, Apr. 2015, pp. 172-176.
  7. F. Araujo, K. W. Halen, S. Biederman, and S. Katzenbeisser, "From Patches to Honey-Patche: Lightweight Attacker Misdirection, Deceptiom, and Disinformation," Proc. of CCS '14 Proc. of the 2014 ACM SIGSAC Conf. on Computer and Communications Security, Nov. 2014, pp. 942-953.
  8. T. K. Lengyel, J. Neumann, S. Maresca, and A. Kiayias, "Towards Hybrid Honeynets vis Virtual Machine Introspection and Cloning," Network and System Security 2013, June 2013, pp. 1-14.
  9. S. Kim, S. Goh, C. Jung, and S. Lee, "Energy-efficient and QoS Guaranteed MAC protocol in Ubiquitous Sensor Networks," J. of the Korea Institute of Electronic Communication Sciences, vol. 3, no. 2, June 2008, pp. 71-78.
  10. M. Son, and Y. Kim, "A Study on Hierarchical Communication Method for Energy Efficiency in Sensor Network Environment," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 8, Aug. 2014, pp. 889-898. https://doi.org/10.13067/JKIECS.2014.9.8.889
  11. W. Jung and Y. Oh, "A Study on Energy Efficient MAC Protocol based on S-MAC Protocol," The J. of Korean Institute of Communications and Information Sciences, vol. 35, no. 2, Feb. 2010, pp. 43-49.