Detecting targeted attacks using shadow honeypots

被引:0
|
作者
Anagnostakis, KG [1 ]
Sidiroglou, S [1 ]
Akritidis, P [1 ]
Xinidis, K [1 ]
Markatos, E [1 ]
Keromytis, AD [1 ]
机构
[1] Univ Penn, CIS Dept, Philadelphia, PA 19104 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present Shadow Honeypots, a novel hybrid architecture that combines the best features of honeypots and anomaly detection. At a high level, we use a variety of anomaly detectors to monitor all traffic to a protected network/service. Traffic that is considered anomalous is processed by a "shadow honeypot" to determine the accuracy of the anomaly prediction. The shadow is an instance of the protected software that shares all internal state with a regular ("production") instance of the application, and is instrumented to detect potential attacks. Attacks against the shadow are caught, and any incurred state changes are discarded. Legitimate traffic that was misclassified will be validated by the shadow and will be handled correctly by the system transparently to the end user. The outcome of processing a request by the shadow is used to filter future attack instances and could be used to update the anomaly detector. Our architecture allows system designers to fine-tune systems for performance, since false positives will be filtered by the shadow. Contrary to regular honeypots, our architecture can be used both for server and client applications. We demonstrate the feasibility of our approach in a proof-of-concept implementation of the Shadow Honeypot architecture for the Apache web server and the Mozilla Firefox browser. We show that despite a considerable overhead in the instrumentation of the shadow honeypot (up to 20% for Apache), the overall impact on the system is diminished by the ability to minimize the rate of false-positives.
引用
收藏
页码:129 / 144
页数:16
相关论文
共 50 条
  • [21] Detecting attacks in routers using sketches
    Barman, Dhiman
    Satapathy, Piyush
    Ciardo, Gianfranco
    2007 WORKSHOP ON HIGH PERFORMANCE SWITCHING AND ROUTING, 2007, : 179 - +
  • [22] A Sweet Rabbit Hole by DARCY: Using Honeypots to Detect Universal Trigger's Adversarial Attacks
    Le, Thai
    Park, Noseong
    Lee, Dongwon
    59TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS AND THE 11TH INTERNATIONAL JOINT CONFERENCE ON NATURAL LANGUAGE PROCESSING (ACL-IJCNLP 2021), VOL 1, 2021, : 3831 - 3844
  • [23] Survey of Snaring Cyber Attacks on IoT Devices with Honeypots and Honeynets
    Oza, Antara D.
    Kumar, Gardas Naresh
    Khorajiya, Moin
    2018 3RD INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,
  • [24] An IoT Honeynet Based on Multiport Honeypots for Capturing IoT Attacks
    Zhang, Weizhe
    Zhang, Bin
    Zhou, Ying
    He, Hui
    Ding, Zeyu
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05): : 3991 - 3999
  • [25] Detecting Attacks Using Artificial Neural Networks
    I. A. Sikarev
    T. M. Tatarnikova
    Automatic Control and Computer Sciences, 2024, 58 (8) : 1218 - 1225
  • [26] Detecting Attacks on Web Applications using Autoencoder
    Hieu Mac
    Dung Truong
    Lam Nguyen
    Hoa Nguyen
    Hai Anh Tran
    Duc Tran
    PROCEEDINGS OF THE NINTH INTERNATIONAL SYMPOSIUM ON INFORMATION AND COMMUNICATION TECHNOLOGY (SOICT 2018), 2018, : 416 - 421
  • [27] SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots
    Nawrocki, Marcin
    John, Kristoff
    Hiesgen, Raphael
    Kanich, Chris
    Schmidt, Thomas C.
    Waehlisch, Matthias
    2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 576 - 591
  • [28] Causal analysis of attacks against honeypots based on properties of countries
    Zuzcak, Matej
    Bujok, Petr
    IET INFORMATION SECURITY, 2019, 13 (05) : 435 - 447
  • [29] Shadow Detecting using Mathematical Morphology and Smirnov Test
    Xing Chao
    Li Yanjun
    Zhang Ke
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [30] Building Suspiciousness Cascading Graph over Multiple Hosts for Detecting Targeted Attacks
    Kawaguchi, Nobutaka
    Tomimura, Hideyuki
    Tsuichihara, Mamoru
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,