Detecting targeted attacks using shadow honeypots

被引:0
|
作者
Anagnostakis, KG [1 ]
Sidiroglou, S [1 ]
Akritidis, P [1 ]
Xinidis, K [1 ]
Markatos, E [1 ]
Keromytis, AD [1 ]
机构
[1] Univ Penn, CIS Dept, Philadelphia, PA 19104 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present Shadow Honeypots, a novel hybrid architecture that combines the best features of honeypots and anomaly detection. At a high level, we use a variety of anomaly detectors to monitor all traffic to a protected network/service. Traffic that is considered anomalous is processed by a "shadow honeypot" to determine the accuracy of the anomaly prediction. The shadow is an instance of the protected software that shares all internal state with a regular ("production") instance of the application, and is instrumented to detect potential attacks. Attacks against the shadow are caught, and any incurred state changes are discarded. Legitimate traffic that was misclassified will be validated by the shadow and will be handled correctly by the system transparently to the end user. The outcome of processing a request by the shadow is used to filter future attack instances and could be used to update the anomaly detector. Our architecture allows system designers to fine-tune systems for performance, since false positives will be filtered by the shadow. Contrary to regular honeypots, our architecture can be used both for server and client applications. We demonstrate the feasibility of our approach in a proof-of-concept implementation of the Shadow Honeypot architecture for the Apache web server and the Mozilla Firefox browser. We show that despite a considerable overhead in the instrumentation of the shadow honeypot (up to 20% for Apache), the overall impact on the system is diminished by the ability to minimize the rate of false-positives.
引用
收藏
页码:129 / 144
页数:16
相关论文
共 50 条
  • [31] Countering targeted file attacks using LocationGuard
    Srivatsa, M
    Liu, L
    USENIX Association Proceedings of the 14th USENIX Security Symposium, 2005, : 81 - 96
  • [32] TransMIA: Membership Inference Attacks Using Transfer Shadow Training
    Hidano, Seira
    Murakami, Takao
    Kawamoto, Yusuke
    2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
  • [33] Improved Self Adaptive Honeypots Capable of Detecting Rootkit Malware
    Pauna, Adrian
    2012 9TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2012, : 281 - 284
  • [34] Detecting shadow lobbying
    Slobozhan, Ivan
    Ormosi, Peter
    Sharma, Rajesh
    SOCIAL NETWORK ANALYSIS AND MINING, 2022, 12 (01)
  • [35] Detecting shadow lobbying
    Ivan Slobozhan
    Peter Ormosi
    Rajesh Sharma
    Social Network Analysis and Mining, 2022, 12
  • [36] Shadow detecting and shadow interpolation algorithm for InSAS
    Zhang Sen
    Chen Ming
    Tang Jinsong
    ADVANCED DESIGNS AND RESEARCHES FOR MANUFACTURING, PTS 1-3, 2013, 605-607 : 2121 - +
  • [37] Shadow Attacks on MEDA Biochips
    Shayan, Mohammed
    Bhattacharjee, Sukanta
    Liang, Tung-Che
    Tang, Jack
    Chakrabarty, Krishnendu
    Karri, Ramesh
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [38] Detecting VoIP Fuzzing Attacks By Using a Honeypot System
    Kilinc, H. Hakan
    Cagal, Ugur
    2017 25TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2017,
  • [39] Detecting Medley of Iris Spoofing Attacks using DESIST
    Kohli, Naman
    Yadav, Daksha
    Vatsa, Mayank
    Singh, Richa
    Noore, Afzel
    2016 IEEE 8TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2016,
  • [40] Detecting DDoS attacks using adversarial neural network
    Mustapha, Ali
    Khatoun, Rida
    Zeadally, Sherali
    Chbib, Fadlallah
    Fadlallah, Ahmad
    Fahs, Walid
    El Attar, Ali
    COMPUTERS & SECURITY, 2023, 127