Gotta catch ’em all: a Multistage Framework for honeypot fingerprinting

نویسندگان

چکیده

Honeypots are decoy systems that lure attackers by presenting them with a seemingly vulnerable system. They provide an early detection mechanism as well method for learning how adversaries work and think. However, over the last years number of researchers have shown methods fingerprinting honeypots. This significantly decreases value honeypot; if attacker is able to recognize existence such system, they can evade it. In this article, we revisit honeypot identification field, providing holistic framework includes state art novel components. We decrease probability false positives proposing rigid multi-step approach labeling system honeypot. perform extensive scans covering 2.9 billion addresses IPv4 space identify total 21,855 instances. Moreover, present interesting side-findings around 355,000 non-honeypot represent potentially misconfigured or unpatched servers (e.g. SSH default password configurations versions). ethically disclose our findings network administrators about configuration developers gaps in implementation lead possible fingerprinting. Lastly, discuss countermeasures against techniques.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Gotta (efficiently) catch them all: Pokémon GO meets Orienteering Problems

In this paper a new routing problem referred to as the Generalized Clustered Orienteering Problem (GCOP) is studied. The problem is motivated by the mobile phone game Pokémon GO, an augmented reality game for mobile devices holding a record-breaking reception: within the first month of its release, more than 100 million users have installed the game on their device. The game’s immense popularit...

متن کامل

A Virtual Honeypot Framework

A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new attack and exploitation trends, or allow in-depth examination of adversaries during and after exploitation of a honeypot. Deploying a physical honeypot is often time intensive and expensive as different operating syst...

متن کامل

We All Gotta Go Sometime

Trembling aspens (Populus tremuloides) are among the world’s most remarkable trees, forming vast clones that can live an improbably long time. These clones share a common root system, from which new trees arise, cover up to 43 hectares and persist up to a million years. The vigor of these ancient plants belies their years, leading to speculation that they defy aging or senescence. But demonstra...

متن کامل

You gotta know when to hold 'em...

Putting together a winning team is certainly not a game. It requires skill, diligence, and a little bit of luck. The poker analogy is simply a tool to present critical information in a fun, relevant format. However, with a proactive, pragmatic, and creative approach to hiring, you will improve your odds of successfully hiring the perfect match for your practice. Good luck!

متن کامل

Honeypotlabsac: a Virtual Honeypot Framework for Android

Mobile devices suffer daily threats of various kinds, in particular in a digital form, where users without consent receives and installs malware on their mobile devices via wireless networks, getting their information vulnerable to unauthorized persons. Aiming to learn more targeted attacks on mobile devices, this paper presents a mechanism that emulates services and protocols within a mobile d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Digital threats

سال: 2023

ISSN: ['2692-1626', '2576-5337']

DOI: https://doi.org/10.1145/3584976