首页> 外文会议>IFIP/IEEE Symposium on Integrated Network and Service Management >Detect Me If You… Oh Wait. An Internet-Wide View of Self-Revealing Honeypots
【24h】

Detect Me If You… Oh Wait. An Internet-Wide View of Self-Revealing Honeypots

机译:如果你发现我...哦,等等。互联网范围内的自我揭示蜜罐视图

获取原文

摘要

Open-source honeypots are a vital component in the protection of networks and the observation of trends in the threat landscape. Their open nature also enables adversaries to identify the characteristics of these honeypots in order to detect and avoid them. In this study, we investigate the prevalence of 14 open- source honeypots running more or less default configurations, making them easily detectable by attackers. We deploy 20 simple signatures and test them for false positives against servers for domains in the Alexa top 10,000, official FTP mirrors, mail servers in real operation, and real IoT devices running telnet. We find no matches, suggesting good accuracy. We then measure the Internet-wide prevalence of default open-source honeypots by matching the signatures with Censys scan data and our own scans. We discovered 19,208 honeypots across 637 Autonomous Systems that are trivially easy to identify. Concentrations are found in research networks, but also in enterprise, cloud and hosting networks. While some of these honeypots probably have no operational relevance, e.g., they are student projects, this explanation does not fit the wider population. One cluster of honeypots was confirmed to belong to a well-known security center and was in use for ongoing attack monitoring. Concentrations in an another cluster appear to be the result of government incentives. We contacted 11 honeypot operators and received response from 4 operators, suggesting the problem of lack of network hygiene. Finally, we find that some honeypots are actively abused by attackers for hosting malicious binaries. We notified the owners of the detected honeypots via their network operators and provided recommendations for customization to avoid simple signature-based detection. We also shared our results with the honeypot developers.
机译:开源蜜罐是保护网络和观察威胁趋势的重要组成部分。它们的开放性还使对手能够识别这些蜜罐的特征,以便发现并避免它们。在这项研究中,我们调查了运行或多或少默认配置的14个开源蜜罐的普遍性,使其易于被攻击者检测到。我们部署了20个简单签名,并针对Alexa前10,000个域中的域服务器,官方FTP镜像,实际运行的邮件服务器以及运行telnet的实际IoT设备,对它们进行了误判测试。我们找不到匹配项,表明准确性很高。然后,我们通过将签名与Censys扫描数据和我们自己的扫描进行匹配,来测量Internet范围内默认开源蜜罐的流行程度。我们在637个自治系统中发现了19208个蜜罐,这些罐子很容易识别。研究网络,企业,云和托管网络中都存在集中度。尽管其中一些蜜罐可能与操作无关,例如,它们是学生项目,但这种解释并不适合更广泛的人群。证实有一个蜜罐集群属于一个著名的安全中心,并且正在用于进行持续的攻击监视。另一个集群中的集中度似乎是政府激励措施的结果。我们联系了11家蜜罐运营商,并收到4家运营商的答复,这表明缺乏网络卫生的问题。最后,我们发现某些蜜罐因托管恶意二进制文件而被攻击者滥用。我们通过其网络运营商将检测到的蜜罐通知了所有者,并提供了自定义建议,以避免基于签名的简单检测。我们还与蜜罐开发人员分享了我们的结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号