Detecting targeted attacks using shadow honeypots

被引:0
|
作者
Anagnostakis, KG [1 ]
Sidiroglou, S [1 ]
Akritidis, P [1 ]
Xinidis, K [1 ]
Markatos, E [1 ]
Keromytis, AD [1 ]
机构
[1] Univ Penn, CIS Dept, Philadelphia, PA 19104 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present Shadow Honeypots, a novel hybrid architecture that combines the best features of honeypots and anomaly detection. At a high level, we use a variety of anomaly detectors to monitor all traffic to a protected network/service. Traffic that is considered anomalous is processed by a "shadow honeypot" to determine the accuracy of the anomaly prediction. The shadow is an instance of the protected software that shares all internal state with a regular ("production") instance of the application, and is instrumented to detect potential attacks. Attacks against the shadow are caught, and any incurred state changes are discarded. Legitimate traffic that was misclassified will be validated by the shadow and will be handled correctly by the system transparently to the end user. The outcome of processing a request by the shadow is used to filter future attack instances and could be used to update the anomaly detector. Our architecture allows system designers to fine-tune systems for performance, since false positives will be filtered by the shadow. Contrary to regular honeypots, our architecture can be used both for server and client applications. We demonstrate the feasibility of our approach in a proof-of-concept implementation of the Shadow Honeypot architecture for the Apache web server and the Mozilla Firefox browser. We show that despite a considerable overhead in the instrumentation of the shadow honeypot (up to 20% for Apache), the overall impact on the system is diminished by the ability to minimize the rate of false-positives.
引用
收藏
页码:129 / 144
页数:16
相关论文
共 50 条
  • [41] Detecting SQL Injection Attacks Using SNORT IDS
    Alnabulsi, Hussein
    Islam, Md Rafiqul
    Mamun, Quazi
    2014 ASIA-PACIFIC WORLD CONGRESS ON COMPUTER SCIENCE AND ENGINEERING (APWC ON CSE), 2014,
  • [42] Detecting Port Scan Attacks Using Logistic Regression
    Abu Al-Haija, Qasem
    Saleh, Eyad
    Alnabhan, Mohammad
    2021 4TH INTERNATIONAL SYMPOSIUM ON ADVANCED ELECTRICAL AND COMMUNICATION TECHNOLOGIES (ISAECT), 2021,
  • [43] Detecting Spoofing Attacks in Zigbee using Device Fingerprinting
    Talakala, Grace Hanusha
    Bapat, Jyotsna
    2021 IEEE 18TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2021,
  • [44] Detecting Denial-of-Service Attacks Using sFlow
    Hublikar, Shivaraj
    Eligar, Vijaya
    Kakhandki, Arun
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 483 - 491
  • [45] Detecting Spectre Attacks Using Hardware Performance Counters
    Li, Congmiao
    Gaudiot, Jean-Luc
    IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (06) : 1320 - 1331
  • [46] Detecting DDoS Attacks using Decision Tree Algorithm
    Lakshminarasimman, S.
    Ruswin, S.
    Sundarakantham, K.
    2017 FOURTH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2017,
  • [47] On Detecting Relay Attacks on RFID Systems Using Qubits
    Abidin, Aysajan
    CRYPTOGRAPHY, 2020, 4 (02) : 1 - 12
  • [48] Detecting DoS Attacks Using Packet Size Distribution
    Du, Ping
    Abe, Shunji
    2007 2ND BIO-INSPIRED MODELS OF NETWORKS, INFORMATION AND COMPUTING SYSTEMS (BIONETICS), 2007, : 88 - 91
  • [49] Detecting Spear Phishing Attacks Using Machine Learning
    Regulagadda, Ramakrishna
    Krishna, M. Sai
    Prasanth, G.
    Sumalatha, V
    Ramesh, Y. Sai
    INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (05) : 1457 - 1459
  • [50] Detecting Cache Pollution Attacks Using Bloom Filter
    Ashihara, Takakazu
    Kamiyamat, Noriaki
    2021 27TH IEEE INTERNATIONAL SYMPOSIUM ON LOCAL AND METROPOLITAN AREA NETWORKS (LANMAN), 2021,