Clandestine cell based honeypot networks

dc.contributor.author Cagatay Yucel
dc.contributor.author Ahmet Hasan Koltuksuz
dc.contributor.author Hüseyin Yaǧci
dc.contributor.author Yucel, Cagatay
dc.contributor.author Yagci, Huseyin
dc.contributor.author Koltuksuz, Ahmet
dc.contributor.editor R. Koch , G.D. Rodosek
dc.date.accessioned 2025-10-06T17:52:12Z
dc.date.issued 2016
dc.description.abstract A Clandestine Cell is a type of an intelligence organization where a cell only knows the immediate superior and the associated members of itself. This kind of organizational structure is used by intelligence agencies throughout the world to provide security against a breach thus ensuring the safety of the members. This well-known intelligence organization is applied to solve an advanced cyber security issue. A relatively new kind of a cyber threat known as an Advanced Persistent Threat (APTs) has been around for some time now Stuxnet being the very first identified. There are several points to consider when identifying the characteristics of an APT such as the aim its interactions with Internet way of collecting information operations they do disrupt and concealment mechanisms utilized. An important aspect is whether it is statistically analyzable or dynamically identifiable that its communication patterns need to be inspected to identify the characteristics. The traces of an APT might be identified this way. In this research a honeypot network with a communication policy based on a clandestine cell is introduced. Each honeypot only knows a hub. And a hub only knows the main malware analysis server. By utilizing this approach the communications are hidden from possible attackers without compromising the main server. In each honeypot server dead-ends are created and implemented in the honeypot servers. Advantages and ramifications are discussed regarding the types of malware. It is aimed to create yet another taxonomy of malware regarding the network activities as they are being trapped by our introduced honeypot network. A clandestine cell format is one of its kind within organizations. This is the very first time that such kind of format is being applied to honeypot design for APT hunting. This is the paper in which an intelligence organizational structure meets with a network architecture in order to solve a very hard to crack cyber security problem. The idea itself is a new and untried one. © 2023 Elsevier B.V. All rights reserved.
dc.identifier.isbn 9781912764617, 9781914587405, 9781627489089, 9781910810286, 9781912764280, 9781914587702, 9781910309247, 9781911218852, 9781910810934, 9781911218432
dc.identifier.isbn 9781910810965
dc.identifier.isbn 9781910810934
dc.identifier.issn 20488602, 20488610
dc.identifier.issn 2048-8602
dc.identifier.scopus 2-s2.0-84979255801
dc.identifier.uri https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979255801&partnerID=40&md5=f39b5884a0ce4f54eac5567d51e2cc3e
dc.identifier.uri https://gcris.yasar.edu.tr/handle/123456789/9839
dc.language.iso English
dc.publisher Curran Associates Inc.
dc.relation.ispartof 15th European Conference on Cyber Warfare and Security ECCWS 2016
dc.rights info:eu-repo/semantics/closedAccess
dc.source European Conference on Information Warfare and Security ECCWS
dc.subject Advanced Persistent Threats, Clandestine Cell, Clandestine Network Organizations, Honeypots, Cybersecurity, Cytology, Malware, Network Architecture, Network Security, Advanced Persistent Threat, Cell-be, Cell/b.e, Cell/be, Clandestine Cell, Clandestine Network Organization, Clandestine Networks, Honeypots, Intelligence Organizations, Network Organization, Cells
dc.subject Cybersecurity, Cytology, Malware, Network architecture, Network security, Advanced persistent threat, Cell-be, Cell/B.E, Cell/BE, Clandestine cell, Clandestine network organization, Clandestine networks, Honeypots, Intelligence organizations, Network organization, Cells
dc.subject Clandestine Cell
dc.subject Clandestine Network Organizations
dc.subject Honeypots
dc.subject Advanced Persistent Threats
dc.title Clandestine cell based honeypot networks
dc.type Conference Object
dspace.entity.type Publication
gdc.author.scopusid 56285502500
gdc.author.scopusid 13408802300
gdc.author.scopusid 57203115619
gdc.author.wosid koltuksuz, ahmet/AAJ-5658-2021
gdc.coar.type text::conference output
gdc.description.department
gdc.description.departmenttemp [Yucel, Cagatay; Koltuksuz, Ahmet; Yagci, Huseyin] Yasar Univ, Dept Comp Engn, Izmir, Turkey
gdc.description.endpage 302
gdc.description.publicationcategory Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı
gdc.description.startpage 295
gdc.description.volume 2016-January
gdc.description.woscitationindex Conference Proceedings Citation Index - Science - Conference Proceedings Citation Index - Social Science & Humanities
gdc.identifier.wos WOS:000391677000037
gdc.index.type Scopus
gdc.index.type WoS
gdc.scopus.citedcount 0
gdc.virtual.author Yağci, Hüseyin
gdc.virtual.author Yücel, Çağatay
gdc.virtual.author Koltuksuz, Ahmet Hasan
gdc.wos.citedcount 0
oaire.citation.endPage 302
oaire.citation.startPage 295
person.identifier.scopus-author-id Yucel- Cagatay (56285502500), Koltuksuz- Ahmet Hasan (13408802300), Yaǧci- Hüseyin (57203115619)
publicationvolume.volumeNumber 2016-January
relation.isAuthorOfPublication 4e270ae4-4b68-4b21-bd15-a2368d3d45db
relation.isAuthorOfPublication 516a87df-891f-458d-994e-b459294fda36
relation.isAuthorOfPublication 0a146451-eb5a-43c9-bfca-979da9ee51d7
relation.isAuthorOfPublication.latestForDiscovery 4e270ae4-4b68-4b21-bd15-a2368d3d45db
relation.isOrgUnitOfPublication ac5ddece-c76d-476d-ab30-e4d3029dee37
relation.isOrgUnitOfPublication.latestForDiscovery ac5ddece-c76d-476d-ab30-e4d3029dee37

Files