Abstract—
The application of the honeypot technology with adaptive behavior to monitor and analyze attacks on Internet-of-Things networks is considered. Existing adaptive systems are analyzed, and the optimal one for building a honeypot is determined. It is proposed to use the Markov decision-making process as the mathematical apparatus for the adaptive honeypot system. The resulting honeypot can be used to track attacks on XMPP and SSH protocols.
Similar content being viewed by others
REFERENCES
Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J.A., Invernizzi, L., Kallitsis, M., Kumar, D., Lever, C., Ma, Z., Mason, J., Menscher, D., Seaman, C., Sullivan, N., Thomas, K., and Zhou, Y., Understanding the Mirai botnet, 26th USENIX Security Symp., Vancouver, 2017, Vancouver: USENIX Assoc., 2017, pp. 1093–1110.
Krundyshev, V. and Kalinin, M., Generative adversarial network for detecting cyber threats in industrial systems, Proceeding of International Scientific Conference on Telecommunications, Computing and Control, Voinov, N., Schreck, T., and Khan, S., Eds., Smart Innovation, Systems and Technologies, vol. 220, Singapore: Springer, 2021, pp. 1–13. https://doi.org/10.1007/978-981-33-6632-9_1
Moskvin, D.A. and Ivanov, D.V., Methods of protecting self-organizing networks against attacks on traffic routing, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 745–750. https://doi.org/10.3103/S0146411615080118
Ivanov, D.V. and Moskvin, D.A., Application of fractal methods to ensure the cyber-resilience of self-organizing networks, Nonlinear Phenom. Complex Syst. (Minsk, Belarus), 2019, vol. 22, no. 4, pp. 336–341. https://doi.org/10.33581/1561-4085-2019-22-4-336-341
Cho, H., Lim, S., Kalinin, M., Krundyshev, V., Belenko, V., and Chernenko, V., Genetic sequence alignment computing for ensuring cyber security of the IoT systems, Sustainable Intelligent Systems, Joshi, A., Nagar, A.K., Marín-Raventós, G., Eds., Advances in Sustainability Science and Technology, Singapore: Springer, 2021, pp. 235–252. https://doi.org/10.1007/978-981-33-4901-8_14
Ognev, R.A., Zhukovskii, E.V., and Zegzhda, D.P., Clustering of malicious executable files based on the sequence analysis of system calls, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 1045–1055. https://doi.org/10.3103/S0146411619080212
Zhukovskiy, E.V. and Zegzhda, D.P., Analysis of malware with dangerous trigger-based behavior, Zashchita Inf. Insaid, 2019, no. 3, pp. 60–63.
Belenko, V., Krundyshev, V., and Kalinin, M., Intrusion detection for internet of things applying metagenome fast analysis, Third World Conf. on Smart Trends in Systems Security and Sustainability (WorldS4), London, 2019, IEEE, 2019, pp. 129–135. https://doi.org/10.1109/WorldS4.2019.8904022
Kalinin, M. and Krundyshev, V., Sequence alignment algorithms for intrusion detection in the Internet of Things, Nonlinear Phenom. Complex Syst. (Minsk, Belarus), 2020, vol. 23, no. 4, pp. 397–404. https://doi.org/10.33581/1561-4085-2020-23-4-397-404
Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, Proc. 11th Int. Conf. on Security of Information and Networks, Cardiff, 2018, New York: Association for Computing Machinery, 2018, p. 9. https://doi.org/10.1145/3264437.3264479
Konoplev, A.S., Busygin, A.G., and Zegzhda, D.P., A blockchain decentralized public key infrastructure model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1017–1021. https://doi.org/10.3103/S0146411618080175
Busygin, A.G., Konoplev, A.S., and Zegzhda, D.P., Providing stable operation of self-organizing cyber-physical system via adaptive topology management methods using blockchain-like directed acyclic graph, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1080–1083. https://doi.org/10.3103/S0146411618080059
Busygin, A.G. and Kalinin, M.O., Approach to protection of blockchain systems against threats caused by uneven distribution of computational power, 17th St. Petersburg, Int. Conf. Regional Informatics (RI-2020), St. Petersburg, 2020, St. Petersburg: SPOISU, 2020, pp. 121–122.
Aleksandrova, E.B., Methods of group authentication for low-resource vehicle and flying self-organizing networks, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 947–958. https://doi.org/10.3103/S014641161708003X
Aleksandrova, E.B., Zegzhda, D.P., and Konoplev, A.S., Applying the group signature for entity authentication in distributed grid computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 739–742. https://doi.org/10.3103/S0146411616080265
Aleksandrova, E.B., Rekhviashvili, I. Sh., and Yarmak, A.V., Lattice-based ring signature with linking-based revocation for industrial Internet of Things, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 888–895. https://doi.org/10.3103/S0146411620080039
Ovasapyan, T. and Moskvin, D., Security provision in WSN on the basis of the adaptive behavior of nodes, Fourth World Conf. on Smart Trends in Systems, Security and Sustainability (WorldS4), London, 2020, IEEE, 2020, pp. 81–85. https://doi.org/10.1109/WorldS450073.2020.9210421
Anthi, E., Williams, L., and Burnap, P., Pulse: an adaptive intrusion detection for the internet of things, Living in the Internet of Things: Cybersecurity of the IoT, London, 2018, London: IET Digital Library, 2018. https://doi.org/10.1049/cp.2018.0035
Sabatucci, L., Seidita, V., and Cossentino, M., The four types of self-adaptive systems: A metamodel, Intelligent Interactive Multimedia Systems and Services 2017. KES-IIMSS-18 2018, De Pietro, G., Gallo, L, Howlett, R., and Jain, L., Eds., Smart Innovation, Systems and Technologies, vol. 76, Cham: Springer, 2018, pp. 440–450. https://doi.org/10.1007/978-3-319-59480-4_44
Saint-Andre, P., Smith, K., and Tronon, R., XMPP: The Definitive Guide, O’Reilly Media, 2009.
Ylönen, T., SSH-secure login connections over the Internet, Proc. 6th Conf. on USENIX Security Symp., Focusing on Applications of Cryptography, San Jose, Calif., 1996, Berkeley, Calif.: USENIX Association, 1996, vol. 6, p. 4.
Funding
This work was supported by the Russian Foundation for Basic Research, project no. 18-29-03102.
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
The authors declare that they have no conflicts of interest.
Additional information
Translated by O. Pismenov
About this article
Cite this article
Ovasapyan, T.D., Nikulkin, V.A. & Moskvin, D.A. Applying Honeypot Technology with Adaptive Behavior to Internet-of-Things Networks. Aut. Control Comp. Sci. 55, 1104–1110 (2021). https://doi.org/10.3103/S0146411621080253
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411621080253