Abstract
Aiming at the fact that the network deception technology needs manual work and can’t ensure deception efficiency and accuracy, an automatic deception system with autonomic intrusion tolerance based on autonomic computing is proposed. The theory model of the system is researched and the formal description is denoted which includes service transplant module and decoy subnet module. Service transplant module completes the retargeting of suspicious information and recovering of legal access, implementing the security isolation for object system and inputting deception targets to decoy subnet. Trapping subnet realizes automatic deception, feature analysis and autonomic associative study on attack information. The simulation results show the service availability, even response time, average delay, even transmission speed and resource efficiency of the servers with automatic deception are much better than those of servers without automatic deception.
This paper is supported by The National High Technology Research and Development Program of China (863) (2007AA01Z401), The National Natural Science Foundation of China (90718003).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Spitzner, L.: Honeypots-Definitions and Value of Honeypots (2001), http://www.enteract.com/~lspitz/honeypot.html
The Cuckoos Egg. Clifford Stoll Mass Market Publishing (1995)
An Evening With Berferd, http://www.all.net/books/berferd/berferd.html
Project Honeynet Members. Project Honeynet (2001), http://project.honeynet.org
Horn, P.: Autonomic computing: IBM perspective on the state of information technology. IBM, Armonk, NY (2001)
Anthony, R., Pelc, M., Ward, P., et al.: A Run-Time Configurable Software Architecture for Self-Managing Systems. In: The 5th IEEE International Conference on Autonomic Computing, Chicago, IL, USA, June 2-6 (2008)
Taleb-Bendiab, A.: Autonomic Computing Meets Complex Information Systems: Theory and Practice. In: WEBIST, Barcelona, Spain, March 3-6 (2007)
Kunii, T.L.: Autonomic and Trusted Computing for Ubiquitous Intelligence. In: The 4th International Conference on Autonomic and Trusted Computing (ATC 2007), Hong Kong, China, July 11-13 (2007)
Strassner, J., Samudrala, S., Cox, G., et al.: The Design of a New Context-Aware Policy Model for Autonomic Networking. In: The 5th IEEE International Conference on Autonomic Computing, Chicago, IL, USA, June 2-6 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, B., Wang, H., Feng, G. (2009). Experiment Research of Automatic Deception Model Based on Autonomic Computing. In: Park, J.H., Zhan, J., Lee, C., Wang, G., Kim, Th., Yeo, SS. (eds) Advances in Information Security and Its Application. ISA 2009. Communications in Computer and Information Science, vol 36. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02633-1_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-02633-1_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02632-4
Online ISBN: 978-3-642-02633-1
eBook Packages: Computer ScienceComputer Science (R0)