Attacker Profiling Through Analysis of Attack Patterns in Geographically Distributed Honeypots

05/02/2023
by   Veronica Valeros, et al.
0

Honeypots are a well-known and widely used technology in the cybersecurity community, where it is assumed that placing honeypots in different geographical locations provides better visibility and increases effectiveness. However, how geolocation affects the usefulness of honeypots is not well-studied, especially for threat intelligence as early warning systems. This paper examines attack patterns in a large public dataset of geographically distributed honeypots by answering methodological questions and creating behavioural profiles of attackers. Results show that the location of honeypots helps identify attack patterns and build profiles for the attackers. We conclude that not all the intelligence collected from geographically distributed honeypots is equally valuable and that a good early warning system against resourceful attackers may be built with only two distributed honeypots and a production server.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/02/2020

Automated Attacker Synthesis for Distributed Protocols

Distributed protocols should be robust to both benign malfunction (e.g. ...
research
06/03/2019

Voice Mimicry Attacks Assisted by Automatic Speaker Verification

In this work, we simulate a scenario, where a publicly available ASV sys...
research
06/14/2018

A Memo on the Proof-of-Stake Mechanism

We analyze the economic incentives generated by the proof-of-stake mecha...
research
11/01/2022

Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI

Public and commercial companies extensively share cyber threat intellige...
research
10/09/2021

Widen The Backdoor To Let More Attackers In

As collaborative learning and the outsourcing of data collection become ...
research
09/28/2022

Securing Federated Learning against Overwhelming Collusive Attackers

In the era of a data-driven society with the ubiquity of Internet of Thi...
research
07/08/2020

Multi-Swarm Herding: Protecting against Adversarial Swarms

This paper studies a defense approach against one or more swarms of adve...

Please sign up or login with your details

Forgot password? Click here to reset