Browse > Article
http://dx.doi.org/10.13067/JKIECS.2012.7.2.279

The Case of Novel Attack Detection using Virtual Honeynet  

Kim, Chun-Suk (전남대학교 전자통신공학과)
Kang, Dae-Kwon (전남대학교 전자통신공학과)
Euom, Ieck-Chae (한전KDN 정보보호사업팀)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.7, no.2, 2012 , pp. 279-285 More about this Journal
Abstract
Most national critical key infrastructure, such like electricity, nuclear power plant, and petroleum is run on SCADA (Supervisory Control And Data Acquisition) system as the closed network type. These systems have treated the open protocols like TCP/IP, and the commercial operating system, which due to gradually increasing dependence on IT(Information Technology) is a trend. Recently, concerns have been raised about the possibility of these facilities being attacked by cyber terrorists, hacking, or viruses. In this paper, the method to minimize threats and vulnerabilities is proposed, with the virtual honeynet system architecture and the attack detection algorithm, which can detect the unknown attack patterns of Zero-Day Attack are reviewed.
Keywords
Virtual Honeynet; Honeypot; High-Interaction Honeypots;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 김인중, "중요핵심기반시설(SCADA)에 대한 보안관리연구", 한국통신학회논문지, 30권, 8C호, pp.838-848, 06, 2005.
2 방송통신위원회, 2010 국가정보보호백서, 행정안전부, 4월, 2010년.
3 강대권, "Virtual Honeynet을 이용한 신종공격 탐지기술 개발", 한국전자통신학회논문지, 5권, 4호, pp.406-411, 2010.
4 Honeynet Project, Know Your Enemy :Honeynets, http://www.honeynet.org,2006
5 The Honeynet Project. http://www.honeynet.org.
6 Wikipdeia, Comparison of platform virtual machines, http://en.wikipedia.org/wiki/Comp arison_of_platform virtual_machines
7 E.Alata,Lessons learned from the deployment of a high-interaction honeypot, IEEE Computer Society,2006
8 Sebek. https://projects.honeynet.org/sebek/
9 HFlow, https://projects.honeynet.org/hflow/
10 G. Bednarski et el, "Understanding Network Threats through Honeypot Deployment", CMU, pp 273-306, 2004.
11 Ricky M,Understanding Virtual Honeynets, magam, 2004.
12 김영진, "SCADA시스템의 안전성 확보방안에 관한 연구", 한국정보보호학회논문지, 19권, 6호, pp.146-149, 2009.