Optimal honeynet configuration in enterprise computer networks
Journal of Samara State Technical University, Ser. Physical and Mathematical Sciences, no. 4 (2013), pp. 107-114.

Voir la notice de l'article provenant de la source Math-Net.Ru

The article is devoted to the optimal configuration of honeypots in the enterprise network. It describes the mathematical model of an enterprise computer network with honeypots. The authors analyze the standard ways of setting up honeypot parameters and propose the optimization criterion with regard to the dynamics of the external environment. The optimization problem of configuring decoys is reviewed and the solution of the problem is discussed. Also a procedure of searching optimal honeypot configuration is proposed and recommendations concerning practical appliance of the obtained results are given.
Keywords: omputer network security, honeypots, adaptive systems, mathematical model, optimization.
@article{VSGTU_2013_4_a9,
     author = {Yu. V. Aleinov and I. N. Saushkin},
     title = {Optimal honeynet configuration in enterprise computer networks},
     journal = {Journal of Samara State Technical University, Ser. Physical and Mathematical Sciences},
     pages = {107--114},
     publisher = {mathdoc},
     number = {4},
     year = {2013},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/VSGTU_2013_4_a9/}
}
TY  - JOUR
AU  - Yu. V. Aleinov
AU  - I. N. Saushkin
TI  - Optimal honeynet configuration in enterprise computer networks
JO  - Journal of Samara State Technical University, Ser. Physical and Mathematical Sciences
PY  - 2013
SP  - 107
EP  - 114
IS  - 4
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/VSGTU_2013_4_a9/
LA  - ru
ID  - VSGTU_2013_4_a9
ER  - 
%0 Journal Article
%A Yu. V. Aleinov
%A I. N. Saushkin
%T Optimal honeynet configuration in enterprise computer networks
%J Journal of Samara State Technical University, Ser. Physical and Mathematical Sciences
%D 2013
%P 107-114
%N 4
%I mathdoc
%U http://geodesic.mathdoc.fr/item/VSGTU_2013_4_a9/
%G ru
%F VSGTU_2013_4_a9
Yu. V. Aleinov; I. N. Saushkin. Optimal honeynet configuration in enterprise computer networks. Journal of Samara State Technical University, Ser. Physical and Mathematical Sciences, no. 4 (2013), pp. 107-114. http://geodesic.mathdoc.fr/item/VSGTU_2013_4_a9/

[1] A. V. Lukatcky, Attack detection, BHV—Petersburg, St. Petersburg, 2001, 624 pp.

[2] L. Spitzner, Honeypot. Tracking Hackers, Addison-Wesley, Boston, 2003, 429 pp.

[3] I. V. Kotenko, M. V. Stepashkin, “Deception systems for protection of information resources in computer networks”, Tr. SPIIRAN, 2:1 (2004), 211–230

[4] C. Döring, Improving network security with honeypots. Honeypot project, Master's thesis, University of Applied Sciences Darmstadt, Darmstadt, 2005, 123 pp.

[5] C. Hecker, K. L. Nance, B. Hay, “Dynamic Honeypot Construction”, Proc. of the 10th Colloquium for Information Systems Security Education, University of Maryland, University College, Adelphi, MD, 2006, 95–102

[6] I. Kuwatly, M. Sraj, Z. A. Masri, H. Artail, “A Dynamic Honeypot Design for Intrusion Detection”, 2004 IEEE/ACS International Conference on Pervasive Services (ICPS'04), 2004, 95–104 | DOI

[7] Yu. V. Aleinov, “The principles of construction of model Honeypot systems”, Polzunovskiy vestnik, 2012, no. 3/2, 36–39

[8] I. D. Medvedkovsky, P. V. Sem'yanov, D. G. Leonov, A. V. Lukatsky, Attack from Internet, SOLON-R, Moscow, 2002, 368 pp.