Evaluation of Fingerprinting Techniques and a Windows-based Dynamic Honeypot
نویسندگان
چکیده
Server honeypots are static systems, setup to monitor attacks on research and production networks. Static honeypots are unable to represent the dynamic nature of today’s networks where different numbers of hardware devices and hosts running various operating systems are online at a particular time and frequently join and leave a network. A single static server honeypot presents a particular operating system, open ports and hardware type which are associated with a unique address (i.e. IP/MAC address). A static honeypot system is also always present on the network while other hosts leave and join frequently. These properties of static systems can be a revealing indication of presence of a honeypot within a network. Dynamic honeypots overcome the static nature of server honeypots by automatically adjusting the number of hosts, operating systems and running services of honeypots deployed in a network environment, based on the topology of the production network. In this paper a dynamic honeypot design with self-configuring capabilities based on Windows platform is presented with a focus on usability and simplicity in installation, configuration and management. The honeypot can be deployed within production networks without requiring prior knowledge of network topology, hardware, operating systems and associated services and open ports on the network. Dynamic honeypots can lead to popularity and increased adaption of server honeypots with end-users and within production networks. Active and passive fingerprinting techniques utilized in the process of mapping a network and its systems for dynamic honeypot deployments are also evaluated and their accuracy and speed in detection are measured and discussed.
منابع مشابه
A Dynamic Approach for Honeypot Management
Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...
متن کاملA Dynamic Approach for Honeypot Management
Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...
متن کاملAn Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation
Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...
متن کاملTime-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots
Honeypots have proven to be an effective tool to capture computer intrusions (or malware infections) and analyze their exploitation techniques. However, forensic analysis of compromised honeypots is largely an ad-hoc and manual process. In this paper, we propose Timescope, a system that applies and extends recent advances in deterministic record and replay to high-interaction honeypots for exte...
متن کاملHoneypot through Web (Honeyd@WEB): The Emerging of Security Application Integration
This paper discusses on the development of the Honeyd@WEB. Honeyd@WEB is a system that can deploy low-interaction, production, dynamic and manageable virtual honeypots via a web interface. It runs open source programs, such as P0f (a passive fingerprinting tool) and Honeyd (a low-interaction honeypot). Honeyd@WEB can automatically determine; how many honeypots to deploy, how to deploy them, and...
متن کامل