Measuring and Clustering Network Attackers using Medium-Interaction Honeypots

06/27/2022
by   Zain Shamsi, et al.
0

Network honeypots are often used by information security teams to measure the threat landscape in order to secure their networks. With the advancement of honeypot development, today's medium-interaction honeypots provide a way for security teams and researchers to deploy these active defense tools that require little maintenance on a variety of protocols. In this work, we deploy such honeypots on five different protocols on the public Internet and study the intent and sophistication of the attacks we observe. We then use the information gained to develop a clustering approach that identifies correlations in attacker behavior to discover IPs that are highly likely to be controlled by a single operator, illustrating the advantage of using these honeypots for data collection.

READ FULL TEXT
research
03/03/2020

SoK: A Survey of Open Source Threat Emulators

Threat emulators are tools or sets of scripts that emulate cyber-attacks...
research
01/25/2023

Evaluating Deception and Moving Target Defense with Network Attack Simulation

In the field of network security, with the ongoing arms race between att...
research
08/02/2022

A Model for Perimeter-Defense Problems with Heterogeneous Teams

We develop a model of the multi-agent perimeter-defense game to calculat...
research
07/28/2022

Gotham Testbed: a Reproducible IoT Testbed for Security Experiments and Dataset Generation

The scarcity of available Internet of Things (IoT) datasets remains a li...
research
01/06/2021

A Qualitative Empirical Analysis of Human Post-Exploitation Behavior

Honeypots are a well-studied defensive measure in network security. This...
research
10/12/2020

PoisonIvy: (In)secure Practices of Enterprise IoT Systems in Smart Buildings

The rise of IoT devices has led to the proliferation of smart buildings,...
research
07/02/2019

Build It, Break It, Fix It: Contesting Secure Development

Typical security contests focus on breaking or mitigating the impact of ...

Please sign up or login with your details

Forgot password? Click here to reset