Skip to main content

2019 | OriginalPaper | Buchkapitel

3. Honeypot Deception Tactics

verfasst von : Neil C. Rowe

Erschienen in: Autonomous Cyber Deception

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Honeypots on computer networks are most effective when they use deception to fool cyberadversaries into thinking that they are not actual decoy intelligence collectors. Honeypot deception can be made more effective when applied with variety. We discuss the range of deception tactics of which honeypots can take advantage. Ideas can come from deception theory, and honeypot deceptions can benefit from planning and experimentation.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat P. Aggarwal, C. Gonzalez, and V. Dutt. Looking from the hacker’s perspective: Role of deceptive strategies in cyber security. In 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), pages 1–6, June 2016. P. Aggarwal, C. Gonzalez, and V. Dutt. Looking from the hacker’s perspective: Role of deceptive strategies in cyber security. In 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), pages 1–6, June 2016.
2.
Zurück zum Zitat N. Al-Gharabally, N. El-Sayed, S. Al-Mulla, and I. Ahmad. Wireless honeypots: Survey and assessment. In Proceedings of the 2009 Conference on Information Science, Technology and Applications, ISTA ’09, pages 45–52, New York, NY, USA, 2009. ACM. N. Al-Gharabally, N. El-Sayed, S. Al-Mulla, and I. Ahmad. Wireless honeypots: Survey and assessment. In Proceedings of the 2009 Conference on Information Science, Technology and Applications, ISTA ’09, pages 45–52, New York, NY, USA, 2009. ACM.
3.
Zurück zum Zitat M. H. Almeshekah and E. H. Spafford. Planning and integrating deception into computer security defenses. In Proceedings of the 2014 New Security Paradigms Workshop, pages 127–138, New York, NY, USA, 2014. ACM. M. H. Almeshekah and E. H. Spafford. Planning and integrating deception into computer security defenses. In Proceedings of the 2014 New Security Paradigms Workshop, pages 127–138, New York, NY, USA, 2014. ACM.
4.
Zurück zum Zitat F. Araujo, K. W. Hamlen, S. Biedermann, and S. Katzenbeisser. From patches to honey-patches: Lightweight attacker misdirection, deception, and disinformation. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS ’14, pages 942–953, New York, NY, USA, 2014. ACM. F. Araujo, K. W. Hamlen, S. Biedermann, and S. Katzenbeisser. From patches to honey-patches: Lightweight attacker misdirection, deception, and disinformation. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS ’14, pages 942–953, New York, NY, USA, 2014. ACM.
5.
Zurück zum Zitat K. Borders, L. Falk, and A. Prakash. Openfire: Using deception to reduce network attacks. In SecureComm, pages 224–233. IEEE, 2007. K. Borders, L. Falk, and A. Prakash. Openfire: Using deception to reduce network attacks. In SecureComm, pages 224–233. IEEE, 2007.
6.
Zurück zum Zitat F. De Gaspari, S. Jajodia, L. V. Mancini, and A. Panico. Ahead: A new architecture for active defense. In Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig ’16, pages 11–16, New York, NY, USA, 2016. ACM. F. De Gaspari, S. Jajodia, L. V. Mancini, and A. Panico. Ahead: A new architecture for active defense. In Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig ’16, pages 11–16, New York, NY, USA, 2016. ACM.
7.
Zurück zum Zitat J. Dunnigan and A. Nofi. Victory and Deceit, Second Edition: Deception and Trickery in War. Writers Club Press, San Jose, CA, US, 2001. J. Dunnigan and A. Nofi. Victory and Deceit, Second Edition: Deception and Trickery in War. Writers Club Press, San Jose, CA, US, 2001.
8.
Zurück zum Zitat C. D. Faveri, A. Moreira, and V. Amaral. Goal-driven deception tactics design. In 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), pages 264–275, Oct 2016. C. D. Faveri, A. Moreira, and V. Amaral. Goal-driven deception tactics design. In 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), pages 264–275, Oct 2016.
9.
Zurück zum Zitat C. Fowler and R. Nesbit. Tactical deception in air-land warfare. Journal of Electronic Defense, 18(6), 1995. C. Fowler and R. Nesbit. Tactical deception in air-land warfare. Journal of Electronic Defense, 18(6), 1995.
10.
Zurück zum Zitat D. Fraunholz and H. D. Schotten. Strategic defense and attack in deception based network security. In 2018 International Conference on Information Networking (ICOIN), pages 156–161, Jan 2018. D. Fraunholz and H. D. Schotten. Strategic defense and attack in deception based network security. In 2018 International Conference on Information Networking (ICOIN), pages 156–161, Jan 2018.
12.
Zurück zum Zitat F. Girtler. Efficient Malware Detection by a Honeypot Network. AV Akademikerverlag, 2013. F. Girtler. Efficient Malware Detection by a Honeypot Network. AV Akademikerverlag, 2013.
13.
Zurück zum Zitat X. Han, N. Kheir, and D. Balzarotti. Evaluation of deception-based web attacks detection. In Proceedings of the 2017 Workshop on Moving Target Defense, MTD ’17, pages 65–73, New York, NY, USA, 2017. ACM. X. Han, N. Kheir, and D. Balzarotti. Evaluation of deception-based web attacks detection. In Proceedings of the 2017 Workshop on Moving Target Defense, MTD ’17, pages 65–73, New York, NY, USA, 2017. ACM.
14.
Zurück zum Zitat S. Hassan and R. Guha. A probabilistic study on the relationship of deceptions and attacker skills. In 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), pages 693–698, Nov 2017. S. Hassan and R. Guha. A probabilistic study on the relationship of deceptions and attacker skills. In 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), pages 693–698, Nov 2017.
16.
Zurück zum Zitat P. Pal, N. Soule, N. Lageman, S. S. Clark, M. Carvalho, A. Granados, and A. Alves. Adaptive resource management enabling deception (armed). In Proceedings of the 12th International Conference on Availability, Reliability and Security, ARES ’17, pages 52:1–52:8, New York, NY, USA, 2017. ACM. P. Pal, N. Soule, N. Lageman, S. S. Clark, M. Carvalho, A. Granados, and A. Alves. Adaptive resource management enabling deception (armed). In Proceedings of the 12th International Conference on Availability, Reliability and Security, ARES ’17, pages 52:1–52:8, New York, NY, USA, 2017. ACM.
17.
Zurück zum Zitat N. C. Rowe, E. J. Custy, and B. T. Duong. Defending cyberspace with fake honeypots, 2007. N. C. Rowe, E. J. Custy, and B. T. Duong. Defending cyberspace with fake honeypots, 2007.
18.
Zurück zum Zitat N. C. Rowe and J. Rrushi. Introduction to Cyberdeception. Springer Publishing Company, Incorporated, 1st edition, 2016.CrossRef N. C. Rowe and J. Rrushi. Introduction to Cyberdeception. Springer Publishing Company, Incorporated, 1st edition, 2016.CrossRef
19.
Zurück zum Zitat M. P. Stoecklin, J. Zhang, F. Araujo, and T. Taylor. Dressed up: Baiting attackers through endpoint service projection. In Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFVSec@CODASPY 2018, Tempe, AZ, USA, March 19–21, 2018, pages 23–28, 2018. M. P. Stoecklin, J. Zhang, F. Araujo, and T. Taylor. Dressed up: Baiting attackers through endpoint service projection. In Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFVSec@CODASPY 2018, Tempe, AZ, USA, March 19–21, 2018, pages 23–28, 2018.
20.
Zurück zum Zitat P. Sztompka. Trust. Cambridge University Press, London, UK, 1999. P. Sztompka. Trust. Cambridge University Press, London, UK, 1999.
21.
Zurück zum Zitat J. Tammi, S. Rauti, and V. Leppänen. Practical challenges in building fake services with the record and play approach. In SIN, pages 235–239. ACM, 2017. J. Tammi, S. Rauti, and V. Leppänen. Practical challenges in building fake services with the record and play approach. In SIN, pages 235–239. ACM, 2017.
22.
Zurück zum Zitat V. E. Urias, W. M. S. Stout, and H. W. Lin. Gathering threat intelligence through computer network deception. In 2016 IEEE Symposium on Technologies for Homeland Security (HST), pages 1–6, May 2016. V. E. Urias, W. M. S. Stout, and H. W. Lin. Gathering threat intelligence through computer network deception. In 2016 IEEE Symposium on Technologies for Homeland Security (HST), pages 1–6, May 2016.
23.
Zurück zum Zitat C. Wang and Z. Lu. Cyber deception: Overview and the road ahead. IEEE Security Privacy, 16(2):80–85, March 2018.CrossRef C. Wang and Z. Lu. Cyber deception: Overview and the road ahead. IEEE Security Privacy, 16(2):80–85, March 2018.CrossRef
24.
Zurück zum Zitat W. Wang, J. Bickford, I. Murynets, R. Subbaraman, A. G. Forte, and G. Singaraju. Catching the wily hacker: A multilayer deception system. In 2012 35th IEEE Sarnoff Symposium, pages 1–6, May 2012. W. Wang, J. Bickford, I. Murynets, R. Subbaraman, A. G. Forte, and G. Singaraju. Catching the wily hacker: A multilayer deception system. In 2012 35th IEEE Sarnoff Symposium, pages 1–6, May 2012.
25.
Zurück zum Zitat M. Wegerer and S. Tjoa. Defeating the database adversary using deception - a MySQL database honeypot. In 2016 International Conference on Software Security and Assurance (ICSSA), pages 6–10, Aug 2016. M. Wegerer and S. Tjoa. Defeating the database adversary using deception - a MySQL database honeypot. In 2016 International Conference on Software Security and Assurance (ICSSA), pages 6–10, Aug 2016.
26.
Zurück zum Zitat A. Zarras. The art of false alarms in the game of deception: Leveraging fake honeypots for enhanced security. In 48th IEEE International Carnahan Conference on Security Technology (ICCST), October 2014. A. Zarras. The art of false alarms in the game of deception: Leveraging fake honeypots for enhanced security. In 48th IEEE International Carnahan Conference on Security Technology (ICCST), October 2014.
Metadaten
Titel
Honeypot Deception Tactics
verfasst von
Neil C. Rowe
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-02110-8_3