To What Extent Are Honeypots and Honeynets Autonomic Computing Systems?

07/20/2023
by   Jason M. Pittman, et al.
0

Cyber threats, such as advanced persistent threats (APTs), ransomware, and zero-day exploits, are rapidly evolving and demand improved security measures. Honeypots and honeynets, as deceptive systems, offer valuable insights into attacker behavior, helping researchers and practitioners develop innovative defense strategies and enhance detection mechanisms. However, their deployment involves significant maintenance and overhead expenses. At the same time, the complexity of modern computing has prompted the rise of autonomic computing, aiming for systems that can operate without human intervention. Recent honeypot and honeynet research claims to incorporate autonomic computing principles, often using terms like adaptive, dynamic, intelligent, and learning. This study investigates such claims by measuring the extent to which autonomic principles principles are expressed in honeypot and honeynet literature. The findings reveal that autonomic computing keywords are present in the literature sample, suggesting an evolution from self-adaptation to autonomic computing implementations. Yet, despite these findings, the analysis also shows low frequencies of self-configuration, self-healing, and self-protection keywords. Interestingly, self-optimization appeared prominently in the literature. While this study presents a foundation for the convergence of autonomic computing and deceptive systems, future research could explore technical implementations in sample articles and test them for autonomic behavior. Additionally, investigations into the design and implementation of individual autonomic computing principles in honeypots and determining the necessary ratio of these principles for a system to exhibit autonomic behavior could provide valuable insights for both researchers and practitioners.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/10/2022

Cyber security and the Leviathan

Dedicated cyber-security functions are common in commercial businesses, ...
research
10/29/2021

A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights

Cyberspace is full of uncertainty in terms of advanced and sophisticated...
research
08/28/2018

Comparison of Self-Aware and Organic Computing Systems

With increasing complexity and heterogeneity of computing devices, it ha...
research
03/16/2022

Understanding motivations and characteristics of financially-motivated cybercriminals

Background: Cyber offences, such as hacking, malware creation and distri...
research
05/08/2014

A Self-Adaptive Network Protection System

In this treatise we aim to build a hybrid network automated (self-adapti...
research
10/12/2018

Grand challenges in social physics: In pursuit of moral behavior

Methods of statistical physics have proven valuable for studying the evo...

Please sign up or login with your details

Forgot password? Click here to reset