Detecting targeted attacks using shadow honeypots

被引:0
|
作者
Anagnostakis, KG [1 ]
Sidiroglou, S [1 ]
Akritidis, P [1 ]
Xinidis, K [1 ]
Markatos, E [1 ]
Keromytis, AD [1 ]
机构
[1] Univ Penn, CIS Dept, Philadelphia, PA 19104 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present Shadow Honeypots, a novel hybrid architecture that combines the best features of honeypots and anomaly detection. At a high level, we use a variety of anomaly detectors to monitor all traffic to a protected network/service. Traffic that is considered anomalous is processed by a "shadow honeypot" to determine the accuracy of the anomaly prediction. The shadow is an instance of the protected software that shares all internal state with a regular ("production") instance of the application, and is instrumented to detect potential attacks. Attacks against the shadow are caught, and any incurred state changes are discarded. Legitimate traffic that was misclassified will be validated by the shadow and will be handled correctly by the system transparently to the end user. The outcome of processing a request by the shadow is used to filter future attack instances and could be used to update the anomaly detector. Our architecture allows system designers to fine-tune systems for performance, since false positives will be filtered by the shadow. Contrary to regular honeypots, our architecture can be used both for server and client applications. We demonstrate the feasibility of our approach in a proof-of-concept implementation of the Shadow Honeypot architecture for the Apache web server and the Mozilla Firefox browser. We show that despite a considerable overhead in the instrumentation of the shadow honeypot (up to 20% for Apache), the overall impact on the system is diminished by the ability to minimize the rate of false-positives.
引用
收藏
页码:129 / 144
页数:16
相关论文
共 50 条
  • [1] Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks
    Paradise A.
    Shabtai A.
    Puzis R.
    Elyashar A.
    Elovici Y.
    Roshandel M.
    Peylo C.
    Paradise, Abigail (abigailp@post.bgu.ac.il), 1600, Institute of Electrical and Electronics Engineers Inc., United States (04): : 65 - 79
  • [2] Detecting and Analyzing Zero-day Attacks using Honeypots
    Musca, Constantin
    Mirica, Emma
    Deaconescu, Razvan
    19TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS 2013), 2013, : 543 - 548
  • [3] Use of Honeypots for Mitigating DoS Attacks targeted on IoT Networks
    Anirudh, M.
    Thileeban, Arul S.
    Nallathambi, Daniel Jeswin
    2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND SIGNAL PROCESSING (ICCCSP), 2017, : 11 - 14
  • [4] Analysis and Visualization of SSH Attacks Using Honeypots
    Koniaris, Ioannis
    Papadimitriou, Georgios
    Nicopolitidis, Petros
    2013 IEEE EUROCON, 2013, : 65 - 72
  • [5] A Fuzzy Approach for Detecting and Defending Against Spoofing Attacks on Low Interaction Honeypots
    Naik, Nitin
    Jenkins, Paul
    2018 21ST INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2018, : 904 - 910
  • [6] Analysis of ICS and SCADA Systems Attacks Using Honeypots
    Mesbah, Mohamed
    Elsayed, Mahmoud Said
    Jurcut, Anca Delia
    Azer, Marianne
    FUTURE INTERNET, 2023, 15 (07):
  • [7] Defeating Internet attacks using risk awareness and active honeypots
    Teo, L
    Sun, YA
    Ahn, GJ
    SECOND IEEE INTERNATIONAL INFORMATION ASSURANCE WORKSHOP, PROCEEDINGS, 2004, : 155 - 167
  • [8] A System for Detecting Targeted Cyber-Attacks Using Attack Patterns
    Herwono, Ian
    El-Moussa, Fadi Ali
    INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 20 - 34
  • [9] Using honeypots to model botnet attacks on the internet of medical things
    Wang, Huanran
    He, Hui
    Zhang, Weizhe
    Liu, Wenmao
    Liu, Peng
    Javadpour, Amir
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 102
  • [10] Improving Effectiveness of Honeypots: Predicting Targeted Destination Port Numbers During Attacks Using J48 Algorithm
    Gangabissoon, Tanveer
    Nathoo, Amaan
    Ramhith, Rakshay
    Gopee, Bhooneshwar
    Bekaroo, Girish
    SMART AND SUSTAINABLE ENGINEERING FOR NEXT GENERATION APPLICATIONS, 2019, 561 : 225 - 234