Show simple item record

dc.contributor.authornaik, Nitin
dc.contributor.authorJenkins, Paul
dc.contributor.authorShang, Changjing
dc.contributor.authorShen, Qiang
dc.date.accessioned2021-04-30T09:10:22Z
dc.date.available2021-04-30T09:10:22Z
dc.date.issued2020-04-16
dc.identifier.citationNaik, N., Shang, C., Jenkins, P. and Shen, Q. (2020) 'Building a cognizant honeypot for detecting active fingerprinting attacks using dynamic fuzzy rule interpolation', Expert Systems, p.e12557. https://doi.org/10.1111/exsy.12557en_US
dc.identifier.issn0266-4720
dc.identifier.issn1468-0394 (electronic)
dc.identifier.urihttp://hdl.handle.net/10369/11376
dc.descriptionArticle published in Expert Systems available at https://doi.org/10.1111/exsy.12557en_US
dc.description.abstractDynamic fuzzy rule interpolation (D‐FRI) technique delivers a dynamic rule base through the utilisation of fuzzy rule interpolation to infer more accurate results for a given application problem. D‐FRI offered dynamic rule base is very useful in security areas where network conditions are always volatile and require the most updated rule base. A honeypot is a vital part of any security infrastructure for directly investigating attacks and attackers in real‐time to strengthen the overall security of the network. However, a honeypot as a concealed system can only function successfully while its identity is not revealed to any attackers. Attackers always attempt to uncover such honeypots for avoiding any trap and strengthening their attacks. Active fingerprinting attack is used to detect these honeypots by injecting purposefully designed traffic to a network. Such an attack can be prevented by controlling the traffic but this will make honeypot unusable system if its interaction with the outside world is limited. Alternatively, it is practically more useful if this fingerprinting attack is detected in real‐time to manage its immediate consequences and preventing the honeypot. This article offers an approach to building a cognizant honeypot for detecting active fingerprinting attacks through the utilisation of the established D‐FRI technique. It is based on the use of just a sparse rule base while remaining capable of detecting active fingerprinting attacks when the system does not find any matching rules. Also, it learns from current network conditions and offers a dynamic rule base to facilitate more accurate and efficient detection.en_US
dc.description.sponsorshipPortsmouth Universityen_US
dc.language.isoenen_US
dc.publisherWileyen_US
dc.relation.ispartofseriesExpert Systems
dc.subjectHoneypot; dynamic fuzzy rule interpolation; D-FRI; fuzzy rule interpolation; FRI; fuzzy inference system; active fingerprinting attacken_US
dc.titleBuilding a cognizant honeypot for detecting active fingerprinting attacks using dynamic fuzzy rule interpolationen_US
dc.typeArticleen_US
dc.identifier.doihttps://doi.org/10.1111/exsy.12557
dcterms.dateAccepted2020
rioxxterms.versionAMen_US
rioxxterms.licenseref.uri© 2020 Crown copyright. Expert Systems © 2020 John Wiley & Sons, Ltd.en_US


Files in this item

Thumbnail

This item appears in the following collection(s)

Show simple item record