Improving Exposure of Intrusion Deception System through Implementation of Hybrid Honeypot

Improving Exposure of Intrusion Deception System through Implementation of Hybrid Honeypot

Masood Mansoori1, Omar Zakaria2, and Abdullah Gani3
1,3Faculty of Computer Science and Information Technology, University of Malaya, MALAYSIA
2Department of Computer Science, Faculty of Defence Science and Technology National Defence University of Malaysia, Malaysia
 
Abstract: This paper presents a new design hybrid honeypot to improve the exposure aspect of intrusion deception systems and in particular, research server honeypots. A major attribute in the design of a server honeypot is its passiveness, which allows the honeypot to expose its services and passively wait to be attacked. Although passiveness of a server honeypot simplifies the analysis process by classifying traffics as malicious, however it also lessens its ability to lure attackers through exposure of vulnerable service. As a result it captures smaller amount of data on attacks for analysis. Client honeypot designs, on the other hand, contain modules that actively interact with outside networks, expose vulnerabilities in client side software, and identify malicious content, hosted on webservers. The proposed hybrid system integrates active module concept of a client honeypot into a server honeypot. The active module interacts with webservers utilising a custom crawler and browser, publicises the honeypot’s IP address and therefore improves exposure of server honeypot's vulnerable services. The findings presented in this paper show that interaction with webservers improves exposure, and results in significantly higher number of attacks, which in turn, increases the probability of discovering new threats. The findings also characterise most attacks to be worm based and directed at Windows based hosts and services.


Keywords: IDS, server honeypot, client honeypot, and hybrid honeypot.


Received April 27, 2010; accepted October 24, 2010

Read 4297 times Last modified on Tuesday, 15 November 2011 07:41
Share
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…