SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
BITS Pilani
Hyderabad Campus

Co-operative Deployment in a Honeynet
System
Gokul Kannan. S
Design of Co-operative Deployment
in a Distributed Honeynet System
Authors: Haifeng Wang, Wingkui Chen
Publication: 2010: 14th International Conference on
Computer Supported Co-operative Work in Design

Objective:
To make honeypots easier to deploy & make it more difficult
to detect.

BITS Pilani, Hyderabad Campus
Architecture

BITS Pilani, Hyderabad Campus
Multi-Agent System (MAS)
• Multiple agent systems
• Agent system (Autonomous System)
•
•
•
•

Term autonomous originates from the Greek term: autos meaning self and
nomos meaning rule or law.
Enabling systems to operate independently, without external intervention.
Intelligent Systems (systems running AI algorithms)
Communication, Monitoring, Decision-Making

• Goal-based
•
•

Learn & reason towards achieving their goals
Same goal

BITS Pilani, Hyderabad Campus
Multi-Agent System (MAS)
• 3 types of agents (as per this paper)
•

Honeypot Agent (H.Ag)
– Monitors a set of honeypots
– Sends report to D.Ag
– Executor of deployment

•

Host collector Agent (C.Ag)
– Collect information about network
– Sends report to D.Ag

•

Deploy Agent (D.Ag)
– Get reports from C.Ag and H.Ag
– Communicate with other D.Ag (if a best deploy scheme is
available)

BITS Pilani, Hyderabad Campus
Honey-Farm System (HFS)
• Contains a collection of virtual honeypots
• Induce degree – the capacity of inducing attackers

• Virtual honeypots can be one of the following
•
•
•

Low Interaction
High Interaction
Medium Interaction

BITS Pilani, Hyderabad Campus
Computer Network System
• Contains a set of computer nodes
• OS type: Windows (different versions), Linux
• Host-alter degree
•

Host changing rule

• IPActive

BITS Pilani, Hyderabad Campus
Challenges in deployment
• Type of interaction (low, high, medium)
• Honeypot position
•
•
•
•
•

Outside the security system
Inside the security system (DMZ)
Sub-networks behind firewall
Inside the intranet
etc.

• Distribution of honeypots
•
•
•

Nh – no. of honeypots
Np – no. of computers
P – rate of protection

BITS Pilani, Hyderabad Campus
Co-operative Deploy Strategy

BITS Pilani, Hyderabad Campus
Algorithm 1: Collect status of
computer network

BITS Pilani, Hyderabad Campus
Algorithm 2: Collect status of
honeyfarm

BITS Pilani, Hyderabad Campus
Algorithm 3: Learning & Final
Decision

BITS Pilani, Hyderabad Campus
Algorithm 3: Learning & Final
Decision

BITS Pilani, Hyderabad Campus
Algorithm 4: Co-operative
Deploy

BITS Pilani, Hyderabad Campus
Experiments

BITS Pilani, Hyderabad Campus
Experiments

BITS Pilani, Hyderabad Campus
Thank You !!

BITS Pilani, Hyderabad Campus

Weitere ähnliche Inhalte

Ähnlich wie Gokul seminar

“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
Edge AI and Vision Alliance
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
Alert Logic
 
Unit i introduction to grid computing
Unit i   introduction to grid computingUnit i   introduction to grid computing
Unit i introduction to grid computing
sudha kar
 
Using Data Science for Cybersecurity
Using Data Science for CybersecurityUsing Data Science for Cybersecurity
Using Data Science for Cybersecurity
VMware Tanzu
 

Ähnlich wie Gokul seminar (20)

Hyperledger Blockchain
Hyperledger BlockchainHyperledger Blockchain
Hyperledger Blockchain
 
System models in distributed system
System models in distributed systemSystem models in distributed system
System models in distributed system
 
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
 
influence of AI in IS
influence of AI in ISinfluence of AI in IS
influence of AI in IS
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
IT for management
IT for managementIT for management
IT for management
 
Information Security Analytics
Information Security AnalyticsInformation Security Analytics
Information Security Analytics
 
A multiplatform Java wrapper for the BioAPI framework
A multiplatform Java wrapper for the BioAPI frameworkA multiplatform Java wrapper for the BioAPI framework
A multiplatform Java wrapper for the BioAPI framework
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
 
High time to add machine learning to your information security stack
High time to add machine learning to your information security stackHigh time to add machine learning to your information security stack
High time to add machine learning to your information security stack
 
Capsule Computing: Safe Open Science
Capsule Computing: Safe Open Science Capsule Computing: Safe Open Science
Capsule Computing: Safe Open Science
 
OpenPOWER/POWER9 AI webinar
OpenPOWER/POWER9 AI webinar OpenPOWER/POWER9 AI webinar
OpenPOWER/POWER9 AI webinar
 
Open Source For Self Classification of Data Stream in the Internet Of Things.
Open Source For Self Classification of Data Stream in the Internet Of Things. Open Source For Self Classification of Data Stream in the Internet Of Things.
Open Source For Self Classification of Data Stream in the Internet Of Things.
 
A hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environmentsA hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environments
 
Achieve AI-Powered API Privacy using Open Source
Achieve AI-Powered API Privacy using Open SourceAchieve AI-Powered API Privacy using Open Source
Achieve AI-Powered API Privacy using Open Source
 
Unit i introduction to grid computing
Unit i   introduction to grid computingUnit i   introduction to grid computing
Unit i introduction to grid computing
 
Using Data Science for Cybersecurity
Using Data Science for CybersecurityUsing Data Science for Cybersecurity
Using Data Science for Cybersecurity
 
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataX-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
 
Philips john huffman
Philips john huffmanPhilips john huffman
Philips john huffman
 

Mehr von Pratik Narang (7)

Hades_poster_Comad
Hades_poster_ComadHades_poster_Comad
Hades_poster_Comad
 
Hades
HadesHades
Hades
 
Machine-learning Approaches for P2P Botnet Detection using Signal-processing...
Machine-learning Approaches for P2P Botnet Detection using Signal-processing...Machine-learning Approaches for P2P Botnet Detection using Signal-processing...
Machine-learning Approaches for P2P Botnet Detection using Signal-processing...
 
PeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
PeerShark - Detecting Peer-to-Peer Botnets by Tracking ConversationsPeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
PeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
 
Abhishek presentation october 2013
Abhishek presentation october 2013Abhishek presentation october 2013
Abhishek presentation october 2013
 
Hota iitd
Hota iitdHota iitd
Hota iitd
 
Feature selection for detection of peer to-peer botnet traffic
Feature selection for detection of peer to-peer botnet trafficFeature selection for detection of peer to-peer botnet traffic
Feature selection for detection of peer to-peer botnet traffic
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Gokul seminar

  • 1. BITS Pilani Hyderabad Campus Co-operative Deployment in a Honeynet System Gokul Kannan. S
  • 2. Design of Co-operative Deployment in a Distributed Honeynet System Authors: Haifeng Wang, Wingkui Chen Publication: 2010: 14th International Conference on Computer Supported Co-operative Work in Design Objective: To make honeypots easier to deploy & make it more difficult to detect. BITS Pilani, Hyderabad Campus
  • 4. Multi-Agent System (MAS) • Multiple agent systems • Agent system (Autonomous System) • • • • Term autonomous originates from the Greek term: autos meaning self and nomos meaning rule or law. Enabling systems to operate independently, without external intervention. Intelligent Systems (systems running AI algorithms) Communication, Monitoring, Decision-Making • Goal-based • • Learn & reason towards achieving their goals Same goal BITS Pilani, Hyderabad Campus
  • 5. Multi-Agent System (MAS) • 3 types of agents (as per this paper) • Honeypot Agent (H.Ag) – Monitors a set of honeypots – Sends report to D.Ag – Executor of deployment • Host collector Agent (C.Ag) – Collect information about network – Sends report to D.Ag • Deploy Agent (D.Ag) – Get reports from C.Ag and H.Ag – Communicate with other D.Ag (if a best deploy scheme is available) BITS Pilani, Hyderabad Campus
  • 6. Honey-Farm System (HFS) • Contains a collection of virtual honeypots • Induce degree – the capacity of inducing attackers • Virtual honeypots can be one of the following • • • Low Interaction High Interaction Medium Interaction BITS Pilani, Hyderabad Campus
  • 7. Computer Network System • Contains a set of computer nodes • OS type: Windows (different versions), Linux • Host-alter degree • Host changing rule • IPActive BITS Pilani, Hyderabad Campus
  • 8. Challenges in deployment • Type of interaction (low, high, medium) • Honeypot position • • • • • Outside the security system Inside the security system (DMZ) Sub-networks behind firewall Inside the intranet etc. • Distribution of honeypots • • • Nh – no. of honeypots Np – no. of computers P – rate of protection BITS Pilani, Hyderabad Campus
  • 9. Co-operative Deploy Strategy BITS Pilani, Hyderabad Campus
  • 10. Algorithm 1: Collect status of computer network BITS Pilani, Hyderabad Campus
  • 11. Algorithm 2: Collect status of honeyfarm BITS Pilani, Hyderabad Campus
  • 12. Algorithm 3: Learning & Final Decision BITS Pilani, Hyderabad Campus
  • 13. Algorithm 3: Learning & Final Decision BITS Pilani, Hyderabad Campus
  • 14. Algorithm 4: Co-operative Deploy BITS Pilani, Hyderabad Campus
  • 17. Thank You !! BITS Pilani, Hyderabad Campus