首页> 外文会议>IEEE International Conference on Data Science in Cyberspace >Micro-Honeypot: Using Browser Fingerprinting to Track Attackers
【24h】

Micro-Honeypot: Using Browser Fingerprinting to Track Attackers

机译:微型蜜罐:使用浏览器指纹跟踪攻击者

获取原文

摘要

Web attacks have proliferated across the whole Internet in recent years. To protect websites, security vendors and researchers collect attack information using web honeypots. However, web attackers can hide themselves by using stepping stones (e.g., VPN, encrypted proxy) or anonymous networks (e.g., Tor network). Conventional web honeypots lack an effective way to gather information about an attacker's identity, which raises a big obstacle for cybercrime traceability and forensics. Traditional forensics methods are based on traffic analysis; it requires that defenders gain access to the entire network. It is not suitable for honeypots. In this paper, we present the design, implementation, and deployment of the Micro-Honeypot, which aims to use the browser fingerprinting technique to track a web attacker. Traditional honeypot lure attackers and records attacker's activity. Micro-Honeypot is deployed in a honeypot. It will run and gather identity information when an attacker visits the honeypot. Our preliminary results show that Micro-Honeypot could collect more information and track attackers although they might have used proxies or anonymous networks to hide themselves.
机译:近年来,网络攻击已在整个Internet上激增。为了保护网站,安全供应商和研究人员使用网络蜜罐收集攻击信息。但是,网络攻击者可以通过使用垫脚石(例如VPN,加密代理)或匿名网络(例如Tor网络)来隐藏自己。常规的网络蜜罐缺乏有效的方法来收集有关攻击者身份的信息,这为网络犯罪的可追溯性和取证提供了很大的障碍。传统的取证方法是基于流量分析的;它要求防御者访问整个网络。它不适用于蜜罐。在本文中,我们介绍了Micro-Honeypot的设计,实现和部署,其目的是使用浏览器指纹技术来跟踪Web攻击者。传统的蜜罐吸引攻击者并记录攻击者的活动。 Micro-Honeypot部署在蜜罐中。当攻击者访问蜜罐时,它将运行并收集身份信息。我们的初步结果表明,微型蜜罐可以收集更多信息并跟踪攻击者,尽管他们可能已经使用代理或匿名网络隐藏了自己。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号