Skip to main content

Experiment Research of Automatic Deception Model Based on Autonomic Computing

  • Conference paper
Advances in Information Security and Its Application (ISA 2009)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 36))

Included in the following conference series:

  • 340 Accesses

Abstract

Aiming at the fact that the network deception technology needs manual work and can’t ensure deception efficiency and accuracy, an automatic deception system with autonomic intrusion tolerance based on autonomic computing is proposed. The theory model of the system is researched and the formal description is denoted which includes service transplant module and decoy subnet module. Service transplant module completes the retargeting of suspicious information and recovering of legal access, implementing the security isolation for object system and inputting deception targets to decoy subnet. Trapping subnet realizes automatic deception, feature analysis and autonomic associative study on attack information. The simulation results show the service availability, even response time, average delay, even transmission speed and resource efficiency of the servers with automatic deception are much better than those of servers without automatic deception.

This paper is supported by The National High Technology Research and Development Program of China (863) (2007AA01Z401), The National Natural Science Foundation of China (90718003).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Spitzner, L.: Honeypots-Definitions and Value of Honeypots (2001), http://www.enteract.com/~lspitz/honeypot.html

  2. The Cuckoos Egg. Clifford Stoll Mass Market Publishing (1995)

    Google Scholar 

  3. An Evening With Berferd, http://www.all.net/books/berferd/berferd.html

  4. Project Honeynet Members. Project Honeynet (2001), http://project.honeynet.org

  5. Horn, P.: Autonomic computing: IBM perspective on the state of information technology. IBM, Armonk, NY (2001)

    Google Scholar 

  6. Anthony, R., Pelc, M., Ward, P., et al.: A Run-Time Configurable Software Architecture for Self-Managing Systems. In: The 5th IEEE International Conference on Autonomic Computing, Chicago, IL, USA, June 2-6 (2008)

    Google Scholar 

  7. Taleb-Bendiab, A.: Autonomic Computing Meets Complex Information Systems: Theory and Practice. In: WEBIST, Barcelona, Spain, March 3-6 (2007)

    Google Scholar 

  8. Kunii, T.L.: Autonomic and Trusted Computing for Ubiquitous Intelligence. In: The 4th International Conference on Autonomic and Trusted Computing (ATC 2007), Hong Kong, China, July 11-13 (2007)

    Google Scholar 

  9. Strassner, J., Samudrala, S., Cox, G., et al.: The Design of a New Context-Aware Policy Model for Autonomic Networking. In: The 5th IEEE International Conference on Autonomic Computing, Chicago, IL, USA, June 2-6 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, B., Wang, H., Feng, G. (2009). Experiment Research of Automatic Deception Model Based on Autonomic Computing. In: Park, J.H., Zhan, J., Lee, C., Wang, G., Kim, Th., Yeo, SS. (eds) Advances in Information Security and Its Application. ISA 2009. Communications in Computer and Information Science, vol 36. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02633-1_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02633-1_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02632-4

  • Online ISBN: 978-3-642-02633-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics