4.2 Article

New framework for adaptive and agile honeypots

Journal

ETRI JOURNAL
Volume 42, Issue 6, Pages 965-975

Publisher

WILEY
DOI: 10.4218/etrij.2019-0155

Keywords

adaptive; agile; framework; honeypots; reinforcement learning

Ask authors/readers for more resources

This paper proposes a new framework for the development and deployment of honeypots for evolving malware threats. As new technological concepts appear and evolve, attack surfaces are exploited. Internet of things significantly increases the attack surface available to malware developers. Previously independent devices are becoming accessible through new hardware and software attack vectors, and the existing taxonomies governing the development and deployment of honeypots are inadequate for evolving malicious programs and their variants. Malware-propagation and compromise methods are highly automated and repetitious. These automated and repetitive characteristics can be exploited by using embedded reinforcement learning within a honeypot. A honeypot for automated and repetitive malware (HARM) can be adaptive so that the best responses may be learnt during its interaction with attack sequences. HARM deployments can be agile through periodic policy evaluation to optimize redeployment. The necessary enhancements for adaptive, agile honeypots require a new development and deployment framework.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.2
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Feature dynamic deep learning approach for DDoS mitigation within the ISP domain

Ili Ko, Desmond Chambers, Enda Barrett

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2020)

Article Computer Science, Interdisciplinary Applications

An intelligent ensemble learning approach for energy efficient and interference aware dynamic virtual machine consolidation

Rachael Shaw, Enda Howley, Enda Barrett

SIMULATION MODELLING PRACTICE AND THEORY (2020)

Article Computer Science, Information Systems

Sensing and throughput analysis of a MU-MIMO based cognitive radio scheme for the Internet of Things

M. S. Miah, M. Schukat, E. Barrett

COMPUTER COMMUNICATIONS (2020)

Article Telecommunications

Enhancing the Spectrum Sensing Performance of Cluster-Based Cooperative Cognitive Radio Networks via Sequential Multiple Reporting Channels

Mohammad Amzad Hossain, Michael Schukat, Enda Barrett

Summary: This paper proposes the concept of multiple reporting channels to improve the reporting time delay in cluster-based CCRNs, by allocating individual reporting channels based on frequency division multiple access to extend the sensing time of SUs. This approach enhances the decision accuracy of the FC and reduces the reporting time delay of CHs in comparison to conventional approaches.

WIRELESS PERSONAL COMMUNICATIONS (2021)

Article Computer Science, Information Systems

Applying Reinforcement Learning towards automating energy efficient virtual machine consolidation in cloud data centers

Rachael Shaw, Enda Howley, Enda Barrett

Summary: This paper explores the application of reinforcement learning algorithms for the VM consolidation problem in order to optimize the distribution of virtual machines and improve resource management in data centers. The empirical results demonstrate a 25% improvement in energy efficiency and a 63% reduction in service violations compared to a popular heuristic algorithm.

INFORMATION SYSTEMS (2022)

Article Computer Science, Information Systems

Adaptable feature-selecting and threshold-moving complete autoencoder for DDoS flood attack mitigation

Ili Ko, Desmond Chambers, Enda Barrett

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)

Article Computer Science, Artificial Intelligence

Recurrent autonomous autoencoder for intelligent DDoS attack mitigation within the ISP domain

Ili Ko, Desmond Chambers, Enda Barrett

Summary: The paper discusses the use of Deep Learning algorithms to improve DDoS mitigation systems, proposing an intelligent attack mitigation (IAM) system, and introduces an ensemble approach using Recurrent Autonomous Autoencoders.

INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS (2021)

Article Computer Science, Information Systems

Denial of wallet-Defining a looming threat to serverless computing

Daniel Kelly, Frank G. Glavin, Enda Barrett

Summary: Serverless computing is a new paradigm in cloud computing, offering a powerful development framework but also giving rise to new forms of cyber-attacks. This paper defines and identifies the threat of Denial of Wallet and its potential attack patterns, as well as demonstrates how it can circumvent existing mitigation systems. Additionally, it includes simulated experiments and a test bed for further research.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2021)

Review Green & Sustainable Science & Technology

A review of behind-the-meter energy storage systems in smart grids

Mostafa Rezaeimozafar, Rory F. D. Monaghan, Enda Barrett, Maeve Duffy

Summary: The electric power industry is transitioning towards a carbon-free smart system, with the integration of renewable energy resources bringing new opportunities and challenges for system operators and end-users. Energy storage systems play a crucial role in maximizing these opportunities and mitigating potential challenges. This study focuses on BTM energy storage systems installed in end-users' premises and explores their potential capabilities and challenges in today's power system.

RENEWABLE & SUSTAINABLE ENERGY REVIEWS (2022)

Proceedings Paper Green & Sustainable Science & Technology

Optimal Scheduling for Behind-the-Meter Batteries under Different Tariff Structures

Mostafa Rezaeimozafar, Rory Monaghan, Enda Barrett, Maeve Duffy

Summary: This paper investigates the impact of electricity tariffs on residential photovoltaic systems and batteries, as well as the effects of COVID-influenced consumption patterns and increased subsidies for photovoltaic energy on battery scheduling. It proposes an optimal solution to the battery scheduling problem using a genetic algorithm to minimize electricity costs for customers.

2021 THE 9TH IEEE INTERNATIONAL CONFERENCE ON SMART ENERGY GRID ENGINEERING (SEGE 2021) (2021)

Proceedings Paper Engineering, Electrical & Electronic

MU-MIMO Based Cognitive Radio in Internet of Vehicles (IoV) for Enhanced Spectrum Sensing Accuracy and Sum Rate

Mohammad Amzad Hossain, Michael Schukat, Enda Barrett

Summary: This paper proposes a MU-MIMO antennas aided CB-CSS scheme for CR enabled IoV networks, which enhances sensing gain, sum rate and reduces global error probability compared to conventional SISO antenna based CSS and NCSS schemes.

2021 IEEE 93RD VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-SPRING) (2021)

Proceedings Paper Computer Science, Hardware & Architecture

Serverless Computing: Behind the Scenes of Major Platforms

Daniel Kelly, Frank Glavin, Enda Barrett

2020 IEEE 13TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2020) (2020)

Article Computer Science, Theory & Methods

Self-supervised network traffic management for DDoS mitigation within the ISP domain

Ili Ko, Desmond Chambers, Enda Barrett

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

No Data Available