loading
Documents

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Juan Luis Martin Acal ; Gustavo Romero López ; Pablo Palacín Gómez ; Pablo García Sánchez ; Juan Julián Merelo Guervós and Pedro A. Castillo Valdivieso

Affiliation: University of Granada, Spain

ISBN: 978-989-758-157-1

Keyword(s): Security Systems, Honeypots, Cybersecurity, Network Infrastructure.

Related Ontology Subjects/Areas/Topics: Artificial Intelligence ; Computational Intelligence ; Evolutionary Computing ; Knowledge Discovery and Information Retrieval ; Knowledge-Based Systems ; Machine Learning ; Soft Computing ; Symbolic Systems

Abstract: When dealing with security concerns in the use of network infrastructures a good balance between security concerns and the right to privacy should be maintained. This is very important in scientific networks, because they were created with an open and decentralized philosophy, in favor of the transmission of knowledge, when security was not a essential topic. Although private and scientific information have an enormous value for an attacker, the user privacy for legal and ethical reasons must be respected. Thus, passive detection methods in cybersecurity such as honeypots are a good strategy to achieve this balance between security and privacy in the defense plan of a scientific network. In this paper we present the practical case of the University of Granada in the application of honeypots for the detection and study of intrusions, which avoid intrusive techniques such as the direct analysis of the traffic through networking devices.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.206.15.215

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Martin Acal, J.; Romero López, G.; Palacín Gómez, P.; García Sánchez, P.; García Sánchez, P.; Merelo Guervós, J.; Merelo Guervós, J.; Castillo Valdivieso, P. and Castillo Valdivieso, P. (2015). Cybersecurity and Honeypots: Experience in a Scientific Network Infrastructure.In Proceedings of the 7th International Joint Conference on Computational Intelligence - Volume 1: ECTA, ISBN 978-989-758-157-1, pages 313-318. DOI: 10.5220/0005620203130318

@conference{ecta15,
author={Juan Luis Martin Acal. and Gustavo Romero López. and Pablo Palacín Gómez. and Pablo García Sánchez. and Pablo García Sánchez. and Juan Julián Merelo Guervós. and Juan Julián Merelo Guervós. and Pedro A. Castillo Valdivieso. and Pedro A. Castillo Valdivieso.},
title={Cybersecurity and Honeypots: Experience in a Scientific Network Infrastructure},
booktitle={Proceedings of the 7th International Joint Conference on Computational Intelligence - Volume 1: ECTA,},
year={2015},
pages={313-318},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005620203130318},
isbn={978-989-758-157-1},
}

TY - CONF

JO - Proceedings of the 7th International Joint Conference on Computational Intelligence - Volume 1: ECTA,
TI - Cybersecurity and Honeypots: Experience in a Scientific Network Infrastructure
SN - 978-989-758-157-1
AU - Martin Acal, J.
AU - Romero López, G.
AU - Palacín Gómez, P.
AU - García Sánchez, P.
AU - García Sánchez, P.
AU - Merelo Guervós, J.
AU - Merelo Guervós, J.
AU - Castillo Valdivieso, P.
AU - Castillo Valdivieso, P.
PY - 2015
SP - 313
EP - 318
DO - 10.5220/0005620203130318

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.