首页> 外文会议>IEEE International Conference on Fuzzy Systems >Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots
【24h】

Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots

机译:咬合回来的蜜罐:一种模糊技术,用于识别和抑制低相互作用蜜罐对指纹攻击的模糊技术

获取原文

摘要

The development of a robust strategy for network security is reliant upon a combination of in-house expertise and for completeness attack vectors used by attackers. A honeypot is one of the most popular mechanisms used to gather information about attacks and attackers. However, low-interaction honeypots only emulate an operating system and services, and are more prone to a fingerprinting attack, resulting in severe consequences such as revealing the identity of the honeypot and thus ending the usefulness of the honeypot forever, or worse, enabling it to be converted into a bot used to attack others. A number of tools and techniques are available both to fingerprint low-interaction honeypots and to defend against such fingerprinting; however, there is an absence of fingerprinting techniques to identify the characteristics and behaviours that indicate fingerprinting is occurring. Therefore, this paper proposes a fuzzy technique to correlate the attack actions and predict the probability that an attack is a fingerprinting attack on the honeypot. Initially, an experimental assessment of the fingerprinting attack on the lowinteraction honeypot is performed, and a fingerprinting detection mechanism is proposed that includes the underlying principles of popular fingerprinting attack tools. This implementation is based on a popular and commercially available low-interaction honeypot for Windows - KFSensor. However, the proposed fuzzy technique is a general technique and can be used with any low-interaction honeypot to aid in the identification of the fingerprinting attack whilst it is occurring; thus protecting the honeypot from the fingerprinting attack and extending its life.
机译:在内部专业知识和攻击者使用的完整性攻击向量的组合时依赖于网络安全策略的开发。蜜罐是用于收集有关攻击和攻击者信息的最受欢迎的机制之一。然而,低交互蜜罐仅仿真操作系统和服务,并且更容易发生指纹攻击,导致严重后果,例如揭示蜜罐的身份,从而实现蜜罐的有用性,或者更糟糕的是实现它被转换为用于攻击他人的机器人。指纹低相互作用蜜罐和防御这种指纹识别的许多工具和技术;然而,没有指纹识别技术来识别表明发生指纹识别的特征和行为。因此,本文提出了一种与攻击动作相关的模糊技术,并预测攻击对蜜罐对麦片攻击的可能性。最初,执行对低互动廊口的指纹攻击的实验评估,并且提出了指纹检测机制,其包括流行的指纹攻击工具的潜在原理。此实现基于Windows - KFSensor的流行且商业上可获得的低交互蜜罐。然而,所提出的模糊技术是一种通用技术,可以与任何低相互作用的蜜罐一起使用,以帮助识别指纹识别攻击,同时存在它;因此,保护​​蜜罐免受指纹识别攻击并延长其生命。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号