An Analysis of Honeypot Programs and the Attack Data Collected
Book chapter
Moore, C. and Al-Nemrat, A. 2015. An Analysis of Honeypot Programs and the Attack Data Collected. in: Jahankhani, Hamid, Carlile, Alex, Akhgar, Babak, Taal, Amie, Hessami, Ali G. and Hosseinian-Far, Amin (ed.) Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security Springer International Publishing.
Authors | Moore, C. and Al-Nemrat, A. |
---|---|
Editors | Jahankhani, Hamid, Carlile, Alex, Akhgar, Babak, Taal, Amie, Hessami, Ali G. and Hosseinian-Far, Amin |
Abstract | Honeypots are computers specifically deployed to be a resource that is expected to be attacked or compromised. While the attacker is distracted with the decoy computer system we learn about the attacker and their methods of attack. From the information gained about the attacks we can then review and harden out security systems. Compared to an Intrusion Detection System (IDS) which may trigger false positives, we take the standpoint that nobody ought to be interacting with the decoy computer; therefore we regard all interactions to be of value and worth investigation. A sample of honeypots are evaluated and one selected to collect attacks. The captured attacks reveal the source IP address of the attacker and the service port under attack. Attacks where the exploit attempts to deploy a binary can capture the code, and automatically submit it for analysis to sandboxes such as VirusTotal. |
Book title | Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security |
Year | 2015 |
Publisher | Springer International Publishing |
Publication dates | |
04 Sep 2015 | |
Publication process dates | |
Deposited | 03 Dec 2015 |
Series | Communications in Computer and Information Science |
Event | 10th International Conference, ICGS3 2015 |
ISBN | 978-3-319-23275-1 |
978-3-319-23276-8 | |
ISSN | 1865-0937 |
1865-0929 | |
Web address (URL) | http://dx.doi.org/10.1007/978-3-319-23276-8_20 |
Additional information | 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings |
Journal citation | 534 (534), pp. 228-238 |
Accepted author manuscript | License CC BY-NC-ND |
https://repository.uel.ac.uk/item/854x6
Download files
483
total views2166
total downloads5
views this month4
downloads this month