You are currently on the new version of our website. Access the old version .
InformationInformation
  • Article
  • Open Access

30 September 2018

Performance Analysis of Honeypot with Petri Nets

,
and
College of Computer and Communication Engineering, China University of Petroleum, Qingdao 266580, China
*
Author to whom correspondence should be addressed.
This article belongs to the Section Information Theory and Methodology

Abstract

As one of the active defense technologies, the honeypot deceives the latent intruders to interact with the imitated systems or networks deployed with security mechanisms. Its modeling and performance analysis have not been well studied. In this paper, we propose a honeypot performance evaluation scheme based on Stochastic Petri Nets (SPN). We firstly set up performance evaluation models for three types of defense scenarios (i.e., firewall; firewall and Intrusion Detection System (IDS); firewall, IDS and honeypot) based on SPN. We then theoretically analyze the SPN models by constructing Markov Chains (MC), which are isomorphic to the models. With the steady state probabilities based on the MC, the system performance evaluation is done with theoretical inference. Finally, we implement the proposed three SPN models on the PIPE platform. Five parameters are applied to compare and evaluate the performance of the proposed SPN models. The analysis of the probability and delay of three scenarios shows that the simulation results validate the effectiveness in security enhancement of the honeypot under the SPN models.

1. Introduction

Internet security becomes severely important as more and more applications are developed based on the Internet, which require security guarantee. Since the attacker always behaves before the defender, it can gain the asymmetric advantage over the latter. Thus, it is necessary to design effective approaches to make the defender operate more efficiently. Different from the passive security techniques, such as firewalls [1] and the Intrusion Prevention and Detection Systems (IPDS), the honeypot or honeynet [2,3,4] is intended to defend proactively against attackers. Specifically, the functionality of the honeypot is to deceive the attackers to disrupt the imitated networks, systems or services, protecting the real ones.
Ideally, the attackers are not aware of the deployment of the honeypot, which may lead them to spend much time and energy interacting with the fake services or systems. The honeypot is able to record and analyze an attacker’s behavioral traces, which allows the security administrators to understand the behaviors of other attackers and take appropriate countermeasures. Thus, the honeypot is able to detect the unknown attacks with a very low false positive rate. However, one of the honeypot’s drawbacks lies in its own distinctive characteristics. Some powerful intruders can make use of such characteristics to identify the honeypot, based on which they can even compromise the system.
The researchers have given non-trivial effort to improving the security of the honeypot, which will be discussed in the related work in detail. At the same time, the problem about whether it is worth deploying a honeypot in a given network or system has not been well studied. This motivates us to evaluate and examine the performance of the honeypot in a quantitative way. In this paper, we propose to use Stochastic Petri Nets (SPN) [5,6] to model and analyze three network scenarios: the one protected by a firewall, the one protected by both a firewall and IDS [7] and the one deployed with a firewall, IDS and honeynet. Then, we evaluate the performance of the honeypot based on the three corresponding SPN models.
The main contributions of this paper are summarized as follows:
  • We propose three scenarios of the system defense mechanism with firewall, firewall + IDS and firewall+ IDS + honeypot, respectively;
  • We propose to construct and analyze the SPN models for the three defense scenarios;
  • We conduct extensive simulations to validate the effectiveness of honeypot with the SPN models.
The rest of this paper is organized as follows. In Section 2, we discuss the related work. In Section 3, three network scenarios with different security mechanisms are proposed. Section 4 presents the SPN models of the three scenarios with the theoretical analysis. In Section 5, we conduct the performance evaluation. This paper is finally concluded in Section 6.

3. Network Scenarios

To compare and analyze the performance of the honeypot, we propose three scenarios of a defense mechanism in computer networks.
In Defense Scenario I, only the firewall is adopted in the defense mechanism, as shown in Figure 1. When the intruder attempts to attack the protected system, it will trigger the defense mechanism. During the defense process, the firewall can obtain rules from the rule database to filter the data sent by the intruder. Once there is a rule that matches the data feature, the firewall will drop the data and log it. As the first line of defense, the firewall protects our system or network from intruders and safeguards our data from attack. However, the conventional firewall is designed as a sequence of rules that suffers from three types of major problems: the consistency problem, the completeness problem and the compactness problem [27]. The firewall can rarely identify types of attacks or attacks on allowed services. Therefore, it is easy for the attackers to cross the firewall.
Figure 1. Defense Scenario I with firewall only.
In Defense Scenario II, the IDS will be added into the defense mechanism based on that of the Defense Scenario I, as shown in Figure 2. When the firewall cannot find any rule from its rules database that matches the feature, the data will be delivered to the IDS for detection. The IDS will identify whether the data are legitimate or not based on the signature database of IDS. If so, the IDS will deal with the malicious data. Compared with the function of a firewall, the intrusion detection system is designed as the second line of defense to report corresponding alarms and take immediate action on the intrusions [28]. However, if the network packets are transferred through SSL or VPN, the intrusion detection behavior is hard to detect, and the intrusion detection system will have a lower detection rate and high false negative rate.
Figure 2. Defense Scenario II with firewall and the Intrusion Detection System (IDS).
In Defense Scenario III, the honeypot is deployed based on the defense mechanism of Defense Scenario II, as shown in Figure 3. If the intruder does not identify the honeypot, it will spend a large amount of time and resource interacting with the imitated services or systems. Accordingly, it will be difficult for the intruder to attack the real system due to its limited remaining energy. In this scenario, the honeypot can be thought as the last line of defense in the network and a supplement to the existing IDS. In the actual deployment of the application, these three technologies complement and benefit one another.
Figure 3. Defense Scenario III with firewall, IDS and honeypot.
Obviously, the firewall and IDS are relatively passive in dealing with some unknown attacks launched by the intruders since they do not own the rules or features of the anomaly. However, the honeypot can actively deceive the intruders to interact with it.

4. SPN-Based Modeling and Analysis

4.1. Stochastic Petri Nets

The SPN model is basically composed of three components: places, transitions and arcs. The places represent the states or resource of the system. The transitions represent the events that enable the system’s state transfer. The arcs illustrate the relationship between the places and transitions.
How can we estimate the performance of a system? Here, we give a sample to illustrate it.
Firstly, we need to construct the performance evaluation model of the target system. That depends on the concrete system you want to analyze. Therefore, we directly give a sample model as shown in Figure 4.
Figure 4. A simple sample of the Stochastic Petri Nets (SPN) model.
Secondly, we can construct the Markov Chain (MC) that is isomorphic to the SPN model. At first, we can easily get the reachable graph of the SPN model (as shown in Figure 5). Then, we assume the transition firing rate average is λ = { λ 1 , λ 2 , λ 3 , λ 4 , λ 5 } . Lastly, we get the MC by replacing the transition t i with the corresponding λ i . The reachable markings’ set and the MC of the simple SPN model above are shown in Table 1 and Figure 6.
Figure 5. The reachable graph of the sample.
Table 1. Reachable markings’ set of the sample.
Figure 6. The reachable graph of the sample.
Thirdly, we can work on the system performance evaluation with the steady state probability based on the MC. There are some formulas that help the theoretical inference. They are as follows.
We assume that there are n states in the MC. The transition matrix can be defined as: Q = [ q i , j ] , i i , j n ; there:
q i , j = λ k , t h e r a t e o n t h e a r c f r o m M i t o M j w h e n i j 0 , n o a r c f r o m M i t o M j w h e n i j Σ k λ k , i = j
Then, we assume the steady state probability is a row vector P = { p 1 , p 2 , p 3 , , p n } . According to the Markov process, we can get the system of linear equations as follows:
P Q = 0 Σ i p i = 1 , 1 i n
We can get the steady probability of each state by resolving the system of linear equations above. Ulteriorly, we can get further parameters, such as:
(1) Residence time in each state M:
τ ¯ ( M ) = ( r i , j ) 1 = ( t j ϵ H λ j ) 1
There, H is the transitions’ set that can be enforceable at M.
(2) Token density function:
P [ M ( p ) = i ] = j P [ M j ]
There, M j ϵ [ M ( p ) = i ] , M j ( p ) = i .
(3) Average number of tokens on a place:
u ¯ i = j × P [ M ( p i ) = j ]
The average number of tokens of a place set P i is the sum of each place’s average number of tokens. It can be expressed as:
N ¯ j = P i ϵ P j u ¯ i
There, the place p i ϵ P j .
(4) Utilization rate of the transition:
U ( t ) = M ϵ E P M
There, E represents the set of all reachable markings that make t enforceable.
(5) Token velocity of the transition:
R ( t , s ) = W ( t , s ) × U ( t ) × λ
There, λ stands for the average transition firing rate of t.
On the basis of all the performance parameters mentioned above, we can do further research on the system response time and so on.

4.2. SPN Model

The SPN model is basically composed of three components: places, transitions and arcs. The markings represent the state or resource of the system. The transitions represent the events that enable the system’s state transfer. The arcs illustrate the relationships between the places and transitions. An SPN model is conducted in the following four steps:
  • Step 1: Analyzing the states and the events of the target system in detail;
  • Step 2: Defining the states’ set and the events set according to Step 1;
  • Step 3: Figuring out the relationships between the states and the events;
  • Step 4: Modeling the system with SPN.
Compared with other schemes like prototype design, the SPN is more efficient in conserving the resource such as time and energy. Accordingly, we decide to adopt the SPN in the system modeling and analysis.

4.3. The SPN Model of Scenario I

We construct the SPN model for the Defense Scenario I, as shown in Figure 7. We denote λ = { λ a , λ b , λ c , λ r , λ f , λ d } as the average transition triggering rate and P = { p 0 , p 1 , p 2 , p 3 , p 4 } as the steady state probability. According to the performance evaluation process in [29], we can get the set of reachable markings as M = { M 0 , M 1 , M 2 , M 3 , M 4 } and the isomorphic model together with the Markov Chain (MC) and the process of SPN. The isomorphic model is shown in Table 2 and Figure 8.
Figure 7. Defense Scenario I: the SPN model.
Table 2. Reachable markings’ set of Scenario I.
Figure 8. Defense Scenario I: the isomorphic model with the MC and the process of SPN.
As shown in Figure 7, the places P n o r m a l , P f i r e w a l l , P a l l o w e d , P d e n i e d and P O O C represent the system states, and the transitions T a t t a c k , T f i l t , T d r o p , T b y p a s s and T c o n t r o l represent the events that enable the transfer of the system state. Initially, the system is in normal state P n o r m a l . When the transition T a t t a c k is triggered, the system transfers to the state P f i r e w a l l . If the firewall finds a matched filter rule from its rules’ database, T f i l t will be triggered, and the system will transfer into the denied state P d e n i e d . After that, the T d r o p transition will be triggered, and the legitimate data will be dropped. Then, the system transfers to the normal state. If the firewall does not find any corresponding filter rule, the transition T b y p a s s will be triggered, and the system will be in state P a l l o w e d . By triggering the transition T c o n t r o l , it will start the attack process, and finally, the system will be out of control, i.e., in state P O O C . Then, the administrator recovers the system, and the transition T r e c o v e r will be triggered. Finally, the system will recover to state P n o r m a l .
According to the definition of the transition matrix and other performance metrics in [29], we can estimate the SPN model as follows. The transition matrix Q of the SPN model is:
Q = λ a λ a 0 0 0 0 λ b λ f λ b 0 0 0 0 λ c λ c 0 λ r 0 0 λ r 0 λ d 0 0 0 λ d .
The steady state probability can be obtained as:
p 0 = ( λ b + λ f ) λ a 1 p 1 , p 1 = 1 / { 1 + ( λ b + λ f ) / λ a + λ b / λ c + λ b / λ r + λ f / λ d } , p 2 = λ b / { λ b + λ c + λ c ( λ b + λ f ) / λ a + λ c ( λ b / λ r + λ f / λ d ) } , p 3 = λ b / { λ b + λ r + λ r [ ( λ b + λ f ) / λ a + λ b / λ c + λ f / λ d ] } , p 4 = λ f / { λ d + λ f + λ d [ ( λ b + λ f ) / λ a + λ b / λ r + λ b / λ c ] } .
With the above steady state probability, the token density function can be obtained as:
p [ M ( P n o r m a l = 1 ) ] = p [ M 0 ] = p 0 , p [ M ( P f i r e w a l l = 1 ) ] = p [ M 1 ] = p 1 , p [ M ( P a l l o w e d = 1 ) ] = p [ M 2 ] = p 2 , p [ M ( P d e n i e d = 1 ) ] = p [ M 4 ] = p 4 , p [ M ( P O O C = 1 ) ] = p [ M 3 ] = p 3 .
The average number of the tokens in the place P f i r e w a l l and P d e n i e d is as follows:
μ ¯ f i r e w a l l = p [ M ( P f i r e w a l l = 1 ) ] = p 1 , μ ¯ d e n i e d = p [ M ( P d e n i e d = 1 ) ] = p 4 .
In the subsystem in which the firewall filters out the legitimate data and makes the system transfer to the normal state, the average token number of the place set N ¯ is the sum of μ ¯ f i r e w a l l and μ ¯ d e n i e d . That is, N ¯ = μ ¯ f i r e w a l l + μ ¯ d e n i e d . The utilization rate of the transition T f l i t is U ( T f l i t ) = p 1 . Thus, the token velocity of the transition R ( T f l i t , P d e n i e d ) in the subsystem can be obtained as R ( T f l i t , P d e n i e d ) = W ( T f l i t , P d e n i e d ) × U ( T f l i t ) × λ f = p 1 × λ f , where W ( T f l i t , P d e n i e d ) is set as one by default.
Moreover, we can estimate the performance of Defense Scenario I based on the above inferred parameters. The probability of the defense mechanism P d e f e n s e is the steady probability p 4 that the firewall successfully protects the system from attacking, i.e.,
P d e f e n s e = p 4 .
The probability P f a l l that the system falls is the steady probability p 3 that the intruder takes control of the system, i.e.,
P f a l l = p 3 .
The security probability, denoted as P s e c u r i t y , is the probability that the system is not exposed to the intruders and does not lose control, i.e.,
P s e c u r i t y = 1 p 2 p 3 ,
where p 2 is the steady probability that the intruder bypasses the firewall and the target system is completely exposed to the intruder.
We also need to analyze the time that the firewall consumes to protect the system. In the subsystem mentioned above, we can get the average token number of the place set N ¯ and the token velocity of the transition R ( T f l i t , P d e n i e d ) . According to the little rules and balance principle [30], the delay for the firewall to detect and deal with the aggressive data can be formulated as:
T F = N ¯ / R ( T f l i t , P d e n i e d ) = λ f 1 + λ d 1 .
Note that the analysis of the following two SPN models is similar to that of the first SPN model.

4.4. The SPN Model of Scenario II

The SPN model of Defense Scenario II is shown in Figure 9, in which the system is in the detection state of IDS, i.e., P I D S , after the firewall is bypassed. If the database of IDS has the matched signature, the transition T d e t e c t will be triggered. The system will be in state P m a t c h e d . Then, the system will return to the normal state after the transition T p r o c e s s is enabled. If the IDS cannot identify the intruder, the transition T m i s d e t e c t is enabled, and the system will be in state P u n d e t e c t e d . After that, T c o n t r o l will be triggered, and the system state will be transferred as that in Defense Scenario I, shown in Figure 7.
Figure 9. Defense Scenario II: the SPN model.
We denote λ = { λ a , λ b , λ c , λ r , λ f , λ d , λ e , λ m , λ p } as the average transition triggering rate and P = { p 0 , p 1 , p 2 , p 3 , p 4 , p 5 , p 6 } as the steady state probability. According to the SPN model in Figure 9, we can obtain the reachable markings’ set M = { M 0 , M 1 , M 2 , M 3 , M 4 , M 5 , M 6 } and MC as shown in Table 3 and Figure 10.
Table 3. Reachable markings’ set of Scenario II.
Figure 10. Defense Scenario II: the isomorphic model with the MC and the making process of SPN.
The transition matrix Q is:
Q = λ a λ a 0 0 0 0 0 0 λ f λ b λ f λ b 0 0 0 λ d 0 λ d 0 0 0 0 0 0 0 λ e λ m λ e λ m 0 λ p 0 0 0 λ p 0 0 0 0 0 0 0 λ c λ c λ r 0 0 0 0 0 λ r .
The state steady probability is:
p 0 = ( λ f + λ b ) λ a 1 p 1 , p 1 = 1 / [ 1 + ( λ f + λ b ) λ a 1 + λ f λ d 1 + ( 1 + λ e λ p 1 + λ m λ c 1 + λ m λ r 1 ) λ b / ( λ e + λ m ) ] , p 2 = λ f λ d 1 p 1 , p 3 = 1 / { λ b 1 ( λ e + λ m ) [ 1 + ( λ f + λ b ) λ a 1 + λ f λ d 1 ] + 1 + λ e λ p 1 + λ m λ c 1 + λ m λ r 1 } , p 4 = λ e λ p 1 p 3 , p 5 = λ m λ c 1 p 3 , p 6 = λ m λ r 1 p 3 .
The token density function is:
p [ M ( P n o r m a l = 1 ) ] = p 0 , p [ M ( P f i r e w a l l = 1 ) ] = p 1 , p [ M ( P d e n i e d = 1 ) ] = p 2 , p [ M ( P I D S = 1 ) ] = p 3 , p [ M ( P m a t c h e d = 1 ) ] = p 4 , p [ M ( P u n det e c t e d = 1 ) ] = p 5 , p [ M ( P O O C = 1 ) ] = p 6 .
The average number of the tokens in a place is:
μ ¯ n o r m a l = p 0 , μ ¯ f i r e w a l l = p 1 , μ ¯ d e n i e d = p 2 , μ ¯ I D S = p 3 , μ ¯ m a t c h e d = p 4 , μ ¯ u n det e c t e d = p 5 , μ ¯ O O C = p 6 .
The utilization rate of the transition is:
U ( T a t t a c k ) = p 0 , U ( T f i l t ) = U ( T b y p a s s ) = p 1 , U ( T d r o p ) = p 2 , U ( T det e c t ) = U ( T m i s det e c t ) = p 3 , U ( T p r o c e s s ) = p 4 , U ( T c o n t r o l ) = p 5 , U ( T r e cov e r ) = p 6 .
Then, we can get the token velocity of the transition as:
R ( T f i l t , P d e n i e d ) = W ( T f i l t , P d e n i e d ) × U T f i l t × λ f = p 1 × λ f , R ( T b y p a s s , P I D S ) = W ( T b y p a s s P IDS ) × U T b y p a s s × λ b = p 1 × λ b , R ( T d e t e c t , P m a t c h e d = W ( T d e t e c t , P m a t c h e d ) × U T d e t e c t × λ e = p 3 × λ e .
The probability P d e f e n s e that the defense mechanism works effectively is the sum of the steady probability p 2 and p 4 , where p 2 represents the probability that the firewall detects the attack and p 2 represents the probability that the IDS detects the attack. Then, we can get:
P d e f e n s e = p 2 + p 4 .
The fall probability of the system, denoted as P f a l l , is the steady state probability p 6 that the intruder takes control of the system, i.e.,
P f a l l = p 6 .
The security probability, denoted as P s e c u r i t y , that the system is not exposed to the intruder and does not lose control, can be formulated as:
P s e c u r i t y = 1 p 5 p 6 .
The subsystem in which the firewall detects and deals with the attack is the same as that mentioned in Scenario I. The average token number of the place set N ¯ F is the sum of μ ¯ f i r e w a l l and μ ¯ d e n i e d , i.e., N ¯ F = μ ¯ f i r e w a l l + μ ¯ d e n i e d . Therefore, the delay T F introduced by the firewall is:
T F = N ¯ F / R ( T f l i t , P d e n i e d ) = λ f 1 + λ d 1 .
The delay for the IDS to detect and process the attack behavior can be formulated as:
T D = λ b 1 + λ e 1 + λ p 1 .
When the IDS works, it indicates that the intruder has bypassed the firewall without being detected.

4.5. The SPN Model of Scenario III

The SPN model of the Defense Scenario III is shown in Figure 11. We represent the average transition triggering rate as λ = { λ a , λ b , λ f , λ d , λ e , λ p , λ m , λ v , λ t , λ c , λ r } and the steady state probability as P = { p 0 , p 1 , p 2 , p 3 , p 4 , p 5 , p 6 , p 7 } . According to the model and assumptions, we can get its reachable markings’ set M = { M 0 , M 1 , M 2 , M 3 , M 4 , M 5 , M 6 , M 7 } and MC, as shown in Table 4 and Figure 12.
Figure 11. Defense Scenario III: the SPN model.
Table 4. Reachable markings’ set of Scenario III.
Figure 12. Defense Scenario III: the isomorphic model with the MC and the making process of SPN.
In Figure 11, the honeypot works only after the firewall is bypassed and the IDS cannot identify the legitimate data. The intruder will detect the trap P t r a p set up by the honeypot. On the one hand, if the intruder cannot identify the trap, it will be in the state P h o n e y p o t with the transition T d e c e i v e being enabled. The intruder will be deceived to interact with the honeypot. Therefore, the system will recover to the normal state P n o r m a l with the the transition T i n t e r a c t . On the other hand, if the intruders identify the trap, T c o n t r o l is triggered, and the system state will transfer as described in Figure 7 and Figure 9.
The transition matrix Q is:
Q = λ a λ a 0 0 0 0 0 0 0 λ f λ b λ f λ b 0 0 0 0 λ d 0 λ d 0 0 0 0 0 0 0 0 λ e λ m λ e λ m 0 0 λ p 0 0 0 λ p 0 0 0 0 0 0 0 0 λ v λ c λ v λ c λ t 0 0 0 0 0 λ t 0 λ r 0 0 0 0 0 0 λ r .
The state steady probability is:
p 0 = ( λ f + λ b ) λ a 1 p 1 , p 1 = 1 / [ 1 + ( λ f + λ b ) λ a 1 + λ f λ d 1 + λ b ( λ e + λ m ) 1 ( 1 + λ e λ p 1 ) + λ b λ m ( λ e + λ m ) 1 ( λ v + λ c ) 1 ( 1 + λ v λ t 1 + λ c λ r 1 ) ] , p 2 = λ f λ d 1 p 1 , p 3 = λ b ( λ e + λ m ) 1 p 1 , p 4 = λ e λ p 1 p 3 , p 5 = λ m ( λ v + λ c ) 1 p 3 , p 6 = λ v λ t 1 p 5 , p 7 = λ c λ r 1 p 5 .
The token density function is:
p [ M ( P n o r m a l = 1 ) ] = p 0 , p [ M ( P f i r e w a l l = 1 ) ] = p 1 , p [ M ( P d e n i e d = 1 ) ] = p 2 , p [ M ( P I D S = 1 ) ] = p 3 , p [ M ( P m a t c h e d = 1 ) ] = p 4 , p [ M ( P t r a p = 1 ) ] = p 5 , p [ M ( P h o n e y p o t = 1 ) ] = p 6 , p [ M ( P O O C = 1 ) ] = p 7 .
The average number of the tokens in a place is:
μ ¯ n o r m a l = p 0 , μ ¯ f i r e w a l l = p 1 , μ ¯ d e n i e d = p 2 , μ ¯ I D S = p 3 , μ ¯ m a t c h e d = p 4 , μ ¯ t r a p = p 5 , μ ¯ h o n e y p o t = p 6 , μ ¯ O O C = p 7 .
The utilization rate of the transition is:
U ( T a t t a c k ) = p 0 , U ( T f i l t ) = U ( T b y p a s s ) = p 1 , U ( T d r o p ) = p 2 , U ( T det e c t ) = U ( T m i s det e c t ) = p 3 , U ( T p r o c e s s ) = p 4 , U ( T d e c e i v e ) = U ( T c o n t r o l ) = p 5 , U ( T int e r a c t ) = p 6 , U ( T r e cov e r ) = p 7 .
The token velocity of the transition is:
R ( T f i l t , P d e n i e d ) = p 1 × λ f , R ( T b y p a s s , P I D S ) = p 1 × λ b , R ( T d e t e c t , P m a t c h e d ) = p 3 × λ e , R ( T m i s d e t e c t , P t r a p ) = p 3 × λ m , R ( T d e c e i v e , P h o n e y p o t ) = p 5 × λ v .
Based on the above equations, we can obtain the probability of protecting the system from attacking, denoted as P d e f e n s e , as:
P d e f e n s e = p 2 + p 4 + p 6 ,
where p 2 , p 4 and p 6 represent the steady state probabilities that each of the firewall, IDS and honeypot prevents the intrusion behaviors, respectively.
The system fall probability P f a l l is the steady state probability p 7 that the system is completely controlled by the intruder, i.e.,
P f a l l = p 7 .
The security probability P s e c u r i t y can be formulated as:
P s e c u r i t y = 1 p 5 p 7 ,
where p 5 is the steady probability that the intruder can identify the trap set up by the honeypot.
The time delays that each of the firewall, IDS and honeypot consume respectively in Defense Scenario III can be formulated as:
T F = λ f 1 + λ d 1 , T D = λ b 1 + λ e 1 + λ p 1 , T H = λ b 1 + λ m 1 + λ v 1 + λ t 1 .

5. Performance Evaluation

In this section, we implement the proposed three SPN models on the PIPE platform. To compare and evaluate the performance of the honeypot, we set the parameters as shown in Table 5. P a r . represents the average transition triggering rate, and V a l . is the corresponding value of the rate. Note that, d e t _ r a t e , d e c _ r a t e and i n t _ r a t e correspond to λ e , λ v and λ t , respectively. We can get the three scenarios’ transition triggering rates from Table 5. We set the parameters with the SPN models to conduct further simulations on the PIPE platform. We first present the simulation results. Then, we conduct the performance comparison among the proposed three SPN models.
Table 5. Parameters of the SPN models.

5.1. Simulation Results

The transition triggering rate of the Defense Scenario I’s SPN model shown in Table 6 can be obtained from Table 5. With the simulation, we can get the reachable markings’ set as shown in Table 7 and the reachable graph in Figure 13. We can see that Table 7 is actually the same as Table 2 in Section 4.3, although the identifiers are not consistent. According to MC’s acquiring process of replacing the reachable graph’s transitions with transition triggering rates [29], we can find that the MC in Section 4.3 is correct. Furthermore, we can get the steady state probability in the simulation as illustrated in Table 8.
Table 6. The average transition triggering rate of Scenarios I/II/III.
Table 7. Reachable markings’ set of Scenario I.
Figure 13. The reachable graph for Scenario I.
Table 8. The steady state probability of Scenarios I/II/III.
Firstly, we obtain the transition triggering rate (shown in Table 6) from Table 5. Then, we conduct the simulations, the results of which are illustrated in Table 9, Table 8 and Figure 14.
Table 9. Reachable markings’ set of Scenario II.
Figure 14. The reachable graph for Scenario II.
Similarly, we get the transition triggering rate (shown in Table 6) from Table 5 firstly. We get the results of the reachable markings’ set and reachable graph (illustrated in Table 10 and Figure 15) to validate the theoretical analysis. We obtain the steady state probability for further performance evaluation as illustrated in Table 8.
Table 10. Reachable markings’ set of Scenario III.
Figure 15. The reachable graph for Scenario III.

5.2. Performance Comparison

With the data we get from the above simulations and the equations of the three scenarios in Section 4, we can figure out the fall probability P f a l l , the security probability P s e c u r i t y , the defense probability P d e f e n s e and the delays, as shown in Table 11.
Table 11. Analysis results of probability and delay.
By analyzing the data in Table 11, we can see that with the IDS and honeypot added into the defense mechanism one by one, the security probability of the system and the defense level are both increasing gradually. In contrast, the probability of the system being taken over declines and drops to 2.326%.
Table 11 also shows the delay of the defense techniques in different scenarios. It illustrates that the firewall delay is the same in the three scenarios and the IDS delay is the same in Scenario II and Scenario III. The honeypot delay is the highest one compared with that of the firewall and IDS. The system’s total delay increases sharply in Scenario III.
In summary, the honeypot can enforce the defense level of the computer system at the expense of much more time consumption. Hence, it is suggested that the administrator determine whether to deploy the honeypot or not in the defense mechanism according to the environment and the clients’ requirements on security to avoid wasting the system resource.

6. Conclusions

In this paper, we focus on the performance analysis of the honeypot. Firstly, we proposed three system defense scenarios and constructed performance evaluation models based on stochastic Petri nets. Then, we theoretically analyzed the proposed three SPN models. After that, we conducted the extensive simulations on the PIPE platform, the results of which illustrate the effectiveness in security enhancement of the honeypot under the proposed SPN models.
This paper provides a new way to evaluate the performance of the honeypot system. In some information fields with higher requirements of confidentiality, such as the army combat command system, government office network, large enterprise servers, etc., we can decide whether to choose a honeypot to strengthen the defense and protection of the system according to the actual needs and then estimate the system safety probability, defense success probability, etc. The work can guide the honeypot deployment and improve the comprehensive protective performance of the system.

Author Contributions

Conceptualization and project administration, L.S. Methodology and formal analysis, Y.L. Validation and writing, original draft preparation, H.F.

Funding

This research is supported by the National Natural Science Foundation of China (Grant No. 61772551).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cheminod, M.; Durante, L.; Seno, L.; Valenzano, A. Performance evaluation and modeling of an industrial application-layer firewall. IEEE Trans. Ind. Inform. 2018, 5, 2159–2170. [Google Scholar] [CrossRef]
  2. Jiang, C.B.; Liu, I.H.; Chung, Y.N.; Li, J.S. Novel intrusion prediction mechanism based on honeypot log similarity. Int. J. Netw. Manag. 2016, 3, 156–175. [Google Scholar] [CrossRef]
  3. Paradise, A.; Shabtai, A.; Puzis, R.; Elyashar, A.; Elovici, Y.; Roshandel, M.; Peylo, C. Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks. IEEE Trans. Comput. Soc. Syst. 2017, 3, 65–79. [Google Scholar] [CrossRef]
  4. Wang, K.; Du, M.; Maharjan, S.; Sun, Y. Strategic honeypot game model for distributed denial of service attacks in the smart grid. IEEE Trans. Smart Grid 2017, 5, 2474–2482. [Google Scholar] [CrossRef]
  5. Maione, G.; Mangini, A.M.; Ottomanelli, M. A generalized stochastic petri net approach for modeling activities of human operators in intermodal container terminals. IEEE Trans. Autom. Sci. Eng. 2016, 4, 1504–1516. [Google Scholar] [CrossRef]
  6. List, G.F.; Mashayekhi, M. A modular colored stochastic Petri net for modeling and analysis of signalized intersections. IEEE Trans. Intell. Trans. Syst. 2016, 3, 701–713. [Google Scholar] [CrossRef]
  7. Dhaliwal, S.S.; Nahid, A.; Abbas, R. Effective intrusion detection system using XGBoost. Information 2018, 9, 149. [Google Scholar] [CrossRef]
  8. Liu, M.; Zhang, Q.; Zhao, H.; Yu, D. Network security situation assessment based on data fusion. In Proceedings of the Advances in Knowledge Discovery and Data Mining, Osaka, Japan, 20–23 May 2008; pp. 542–545. [Google Scholar]
  9. Romain, L.; Francois, B.; Abdelmalek, B.; Maroun, C. A specification method for analyzing fine grained network security mechanism configurations. In Proceedings of the Communications and Network Security, Washington, DC, USA, 14–16 October 2013; pp. 483–487. [Google Scholar]
  10. Yuan, H.Q.; Li, Z.H. ARP spoofing and its petri net model. Softw. Guide 2005, 13, 14–16. (In Chinese) [Google Scholar]
  11. Hwang, H.U.; Kim, M.S.; Noh, B.N. Expert system using fuzzy petri nets in computer forensics. In Proceedings of the First International Conference, ICHIT 2006, Jeju Island, Korea, 9–11 November 2006; pp. 312–322. [Google Scholar]
  12. Aliannezhadi, Z.; Azgomi, M.A. Modeling and analysis of a web service firewall using coloured petri nets. In Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9–12 December 2008; pp. 548–553. [Google Scholar]
  13. Dolgikh, A.; Nykodym, T.; Skormin, V.; Antonakos, J.; Baimukhamedov, M. Colored Petri nets as the enabling technology in intrusion detection systems. In Proceedings of the 2011 Military Communications Conference, Baltimore, MA, USA, 7–10 November 2011; pp. 1297–1301. [Google Scholar]
  14. Voron, J.B.; Démoulins, C.; Kordon, F. Adaptable intrusion detection systems dedicated to concurrent programs: A petri net-based approach. In Proceedings of the Tenth International Conference Application of Concurrency to System Design, Braga, Portugal, 21–25 June 2010; pp. 57–66. [Google Scholar]
  15. Balaz, A.; Vokorokos, L. Intrusion detection system based on partially ordered events and patterns. In Proceedings of the IEEE 13th International Conference on Intelligent Engineering Systems, Barbados, 16–18 April 2009; pp. 233–238. [Google Scholar]
  16. Toktabayev, A.; Skormin, V.; Dolgikh, A. Obfuscation resilient behavior based ids based on colored petri nets. In Proceedings of the 15th European conference on Research in computer security, Athens, Greece, 20–22 September 2010. [Google Scholar]
  17. Nykodym, T.; Skormin, V.; Dolgikh, A.; Antonakos, J. Automatic functionality detection in behavior-based ids. In Proceedings of the 2011 Military Communications Conference, Baltimore, MA, USA, 7–10 November 2011; pp. 1302–1307. [Google Scholar]
  18. Ding, W.B. Security analysis of Intrusion Tolerance System based on Petri Nets. Master’s Thesis, Harbin Institute of Technology, Harbin, China, 2006. [Google Scholar]
  19. Wang, C.; Ma, J.F. Availability analysis and comparison of different intrusion-tolerant systems. In Content Computing; Spring: Berlin/Heidelberg, Germany, 2004; pp. 161–166. [Google Scholar]
  20. Yang, J.; Chen, X.; Xiang, X.; Wan, J. HIDS-DT: An effective hybrid intrusion detection system based on decision tree. In Proceedings of the International Conference on Communications and Mobile Computing, Shenzhen, China, 12–14 April 2010; pp. 70–75. [Google Scholar]
  21. Shi, L.Y.; Jia, C.F.; Lv, S.W. Performance evaluation for service hopping system using stochastic petri net. Acta Scientiarum Naturalium Universitatis Nankaiensis 2009, 1, 72–75. [Google Scholar]
  22. Teo, L.; Sun, Y.A.; Ahn, G.J. Defeating internet attacks using risk awareness and active honeypots. In Proceedings of the Fifth Annual IEEE SMC Information Assurance Workshop, West Point, NY, USA, 10–11 June 2004; pp. 155–167. [Google Scholar]
  23. Ding, Z.; Zhou, Y.; Zhou, M. Modeling self-adaptive software systems by fuzzy rules and petri nets. IEEE Trans. Fuzzy Syst. 2018, 26, 967–984. [Google Scholar] [CrossRef]
  24. Behinaein, B.; Rudie, K.; Sangrar, W. Petri net siphon analysis and graph theoretic measures for identifying combination therapies in cancer. IEEE/ACM Trans. Comput. Biol. Bioinform. 2018, 15, 231–243. [Google Scholar] [CrossRef] [PubMed]
  25. Wiśniewski, R.; Karatkevich, A.; Adamski, M.; Costa, A.; Gomes, L. Prototyping of concurrent control systems with application of petri nets and comparability graphs. IEEE Trans. Control Syst. Technol. 2018, 26, 575–586. [Google Scholar] [CrossRef]
  26. Liu, H.C.; Luan, X.; Li, Z.; Wu, J. Linguistic petri nets based on cloud model theory for knowledge representation and reasoning. IEEE Trans. Knowl. Data Eng. 2018, 4, 717–728. [Google Scholar] [CrossRef]
  27. Gouda, M.G.; Liu, A.X. Structured firewall design. Comput. Netw. 2007, 4, 1106–1120. [Google Scholar] [CrossRef]
  28. Diaz-Gomez, P.A.; Hougen, D.F. Improved off-line intrusion detection using a Genetic Algorithm. In Proceedings of the 7th International Conference on Enterprise Information Systems, Miami, FL, USA, 25–28 May 2005; pp. 66–73. [Google Scholar]
  29. Lin, C. Stochastic Petri Net and System Performance Evaluation; Tingshua University: Beijing, China, 2005. [Google Scholar]
  30. Trivedi, K.S. Probability Statistics with Reliability, Queuing and Computer Science Applications; John Wiley and Son: Hoboken, NJ, USA, 2016. [Google Scholar]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.