A study for some experiences of the operation of highly interactive decoy system (Japanese)

In: Transactions of the Information Processing Society of Japan   ;  45 ,  8  ;  1921-1930  ;  2004
  • ISSN:
  • Article (Journal)  /  Print

How to get this document?

With the rapid increase of the number of Internet users, now network use is indispensable to individuals and to organization. Although Internet provides us various services and our lives depend on it heavily, we have many problems of suspicious accesses. However, there are few opportunities to recognize what an actual exploit is, and it is difficult to recognize of the security, that is not visible. In this paper, we deployed a decoy system based on the highly interactive level Honeynet Project has defined. This system enables to be decoy on the OS level, making intruders act freely without restriction. It records not only the known activities, but unknown vulnerabilities and activities without being notified by the intruders. Currently, the concept of highly interactive level decoy system is new, the information in these system is not fully available. From these references, we have conducted an operation of the system, while adding some new features that were necessary. By analyzing all the logs from the system, we describe problems and propose the suitable operation methods.

Table of contents – Volume 45, Issue 8

Show all volumes and issues

The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.

Proposal of an iris identification scheme hiding iris codes
Ota, H. / Kiyomoto, S. / Tanaka, T. | 2004
Design of security architecture for beyond 3G mobile terminals
Kiyomoto, S. / Tanaka, T. / Yoshida, M. / Kuroda, M. | 2004
On anonymity metrics for practical anonymous communication protocols
Kitazawa, S. / Soshi, M. / Miyaji, A. | 2004
A study for some experiences of the operation of highly interactive decoy system
Shibuya, Y. / Koike, H. / Takada, T. / Yasumura, M. / Ishii, T. | 2004
Routing information based packet filtering for IP spoofing prevention
Nakano, M. / Matsumoto, T. | 2004
Regression test selection based on intermediate code for virtual machines
Koju, T. / Takada, S. / Doi, N. | 2004
Generation of character animation holding a tool with its both hands by using three 6DOF trackers
Kawasaki, R. / Kitamura, Y. / Kishino, F. | 2004
A technique to reduce false positives of network IDS with machine learning
Ohya, H. / Miyaji, R. / Kawaguchi, N. / Shigeno, H. / Okada, K. | 2004