Improving exposure of intrusion deception system through implementation of hybrid honeypot
This paper presents a new design hybrid honeypot to improve the exposure aspect of intrusion deception systems and in particular, research server honeypots. A major attribute in the design of a server honeypot is its passiveness, which allows the honeypot to expose its services and passively wait to...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Zarqa University, Jordan
2012
|
Subjects: | |
Online Access: | http://eprints.um.edu.my/4462/1/2012_Improving_Exposure_of_intrusion_deception_system_through_implementation_of_hybrid_honeypot.pdf http://eprints.um.edu.my/4462/ http://iajit.org/PDF/vol.9,no.5/2937-5.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.um.eprints.4462 |
---|---|
record_format |
eprints |
spelling |
my.um.eprints.44622018-10-12T01:22:15Z http://eprints.um.edu.my/4462/ Improving exposure of intrusion deception system through implementation of hybrid honeypot Mansoori, Masood Zakaria, Omar Gani, Abdullah T Technology (General) This paper presents a new design hybrid honeypot to improve the exposure aspect of intrusion deception systems and in particular, research server honeypots. A major attribute in the design of a server honeypot is its passiveness, which allows the honeypot to expose its services and passively wait to be attacked. Although passiveness of a server honeypot simplifies the analysis process by classifying traffics as malicious, however it also lessens its ability to lure attackers through exposure of vulnerable service. As a result it captures smaller amount of data on attacks for analysis. Client honeypot designs, on the other hand, contain modules that actively interact with outside networks, expose vulnerabilities in client side software, and identify malicious content, hosted on webservers. The proposed hybrid system integrates active module concept of a client honeypot into a server honeypot. The active module interacts with webservers utilising a custom crawler and browser, publicises the honeypot�s IP address and therefore improves exposure of server honeypot's vulnerable services. The findings presented in this paper show that interaction with webservers improves exposure, and results in significantly higher number of attacks, which in turn, increases the probability of discovering new threats. The findings also characterise most attacks to be worm based and directed at Windows based hosts and services. Zarqa University, Jordan 2012 Article PeerReviewed application/pdf en http://eprints.um.edu.my/4462/1/2012_Improving_Exposure_of_intrusion_deception_system_through_implementation_of_hybrid_honeypot.pdf Mansoori, Masood and Zakaria, Omar and Gani, Abdullah (2012) Improving exposure of intrusion deception system through implementation of hybrid honeypot. The International Arab Journal of Information Technology, 9 (5). pp. 436-444. ISSN 1683-3198 http://iajit.org/PDF/vol.9,no.5/2937-5.pdf |
institution |
Universiti Malaya |
building |
UM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaya |
content_source |
UM Research Repository |
url_provider |
http://eprints.um.edu.my/ |
language |
English |
topic |
T Technology (General) |
spellingShingle |
T Technology (General) Mansoori, Masood Zakaria, Omar Gani, Abdullah Improving exposure of intrusion deception system through implementation of hybrid honeypot |
description |
This paper presents a new design hybrid honeypot to improve the exposure aspect of intrusion deception systems and in particular, research server honeypots. A major attribute in the design of a server honeypot is its passiveness, which allows the honeypot to expose its services and passively wait to be attacked. Although passiveness of a server honeypot simplifies the analysis process by classifying traffics as malicious, however it also lessens its ability to lure attackers through exposure of vulnerable service. As a result it captures smaller amount of data on attacks for analysis. Client honeypot designs, on the other hand, contain modules that actively interact with outside networks, expose vulnerabilities in client side software, and identify malicious content, hosted on webservers. The proposed hybrid system integrates active module concept of a client honeypot into a server honeypot. The active module interacts with webservers utilising a custom crawler and browser, publicises the honeypot�s IP address and therefore improves exposure of server honeypot's vulnerable services. The findings presented in this paper show that interaction with webservers improves exposure, and results in significantly higher number of attacks, which in turn, increases the probability of discovering new threats. The findings also characterise most attacks to be worm based and directed at Windows based hosts and services. |
format |
Article |
author |
Mansoori, Masood Zakaria, Omar Gani, Abdullah |
author_facet |
Mansoori, Masood Zakaria, Omar Gani, Abdullah |
author_sort |
Mansoori, Masood |
title |
Improving exposure of intrusion deception system through implementation of hybrid honeypot |
title_short |
Improving exposure of intrusion deception system through implementation of hybrid honeypot |
title_full |
Improving exposure of intrusion deception system through implementation of hybrid honeypot |
title_fullStr |
Improving exposure of intrusion deception system through implementation of hybrid honeypot |
title_full_unstemmed |
Improving exposure of intrusion deception system through implementation of hybrid honeypot |
title_sort |
improving exposure of intrusion deception system through implementation of hybrid honeypot |
publisher |
Zarqa University, Jordan |
publishDate |
2012 |
url |
http://eprints.um.edu.my/4462/1/2012_Improving_Exposure_of_intrusion_deception_system_through_implementation_of_hybrid_honeypot.pdf http://eprints.um.edu.my/4462/ http://iajit.org/PDF/vol.9,no.5/2937-5.pdf |
_version_ |
1643687340042878976 |
score |
13.211869 |