Primer – A Tool for Testing Honeypot Measures of Effectiveness

11/01/2020
by   Jason M. Pittman, et al.
0

Honeypots are a deceptive technology used to capture malicious activity. The technology is useful for studying attacker behavior, tools, and techniques but can be difficult to implement and maintain. Historically, a lack of measures of effectiveness prevented researchers from assessing honeypot implementations. The consequence being ineffective implementations leading to poor performance, flawed imitation of legitimate services, and premature discovery by attackers. Previously, we developed a taxonomy for measures of effectiveness in dynamic honeypot implementations. The measures quantify a dynamic honeypot's effectiveness in fingerprinting its environment, capturing valid data from adversaries, deceiving adversaries, and intelligently monitoring itself and its surroundings. As a step towards developing automated effectiveness testing, this work introduces a tool for priming a target honeypot for evaluation. We outline the design of the tool and provide results in the form of quantitative calibration data.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/26/2020

A Taxonomy for Dynamic Honeypot Measures of Effectiveness

Honeypots are computing systems used to capture unauthorized, often mali...
research
05/11/2021

Survey and Taxonomy of Adversarial Reconnaissance Techniques

Adversaries are often able to penetrate networks and compromise systems ...
research
02/07/2023

Catch Me If You Can: Improving Adversaries in Cyber-Security With Q-Learning Algorithms

The ongoing rise in cyberattacks and the lack of skilled professionals i...
research
11/26/2021

Streamlining Evaluation with ir-measures

We present ir-measures, a new tool that makes it convenient to calculate...
research
07/01/2023

Comparing Mobile Testing Tools Using Documentary Analysis

Due to the high demand for mobile applications, given the exponential gr...
research
04/21/2021

Towards Causal Models for Adversary Distractions

Automated adversary emulation is becoming an indispensable tool of netwo...
research
08/31/2023

LLM in the Shell: Generative Honeypots

Honeypots are essential tools in cybersecurity. However, most of them (e...

Please sign up or login with your details

Forgot password? Click here to reset