Skip to main content

An Attacker-Defender Game for Honeynets

  • Conference paper
Computing and Combinatorics (COCOON 2009)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5609))

Included in the following conference series:

Abstract

A honeynet is a portion of routed but otherwise unused address space that is instrumented for network traffic monitoring. It is an invaluable tool for understanding unwanted Internet traffic and malicious attacks. We formalize the problem of defending honeynets from systematic mapping (a serious threat to their viability) as a simple two-person game. The objective of the Attacker is to identify a honeynet with a minimum number of probes. The objective of the Defender is to maintain a honeynet for as long as possible before moving it to a new location within a larger address space. Using this game theoretic framework, we describe and prove optimal or near-optimal strategies for both Attacker and Defender. This is the first mathematically rigorous study of this increasingly important problem on honeynet defense. Our theoretical ideas provide the first formalism of the honeynet monitoring problem, illustrate the viability of network address shuffling, and inform the design of next generation honeynet defense.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bethencourt, J., Franklin, J., Vernon, M.: Mapping Internet Sensors with Probe Response Packets. In: Proceedings of USENIX Security Symposium (2005)

    Google Scholar 

  2. Cai, J.-Y., Yegneswaran, V., Alfeld, C., Barford, P.: Honeygames: A Game Theoretic Approach to Defending Network Monitors. In: University of Wisconsin, Technical Report #1577 (2006)

    Google Scholar 

  3. Cooke, E., Bailey, M., Mao, M., Watson, D., Jahanian, F., McPherson, D.: Toward Understanding Distributed Blackhole Placement. In: Proceedings of CCS Workshop on Rapid Malcode (WORM 2004) (October 2004)

    Google Scholar 

  4. German Honeynet Project. Tracking Botnets (2005), http://www.honeynet.org/papers/bots

  5. Pang, R., Yegneswaran, V., Barford, P., Paxson, V., Peterson, L.: Characteristics of Internet Background Radiation. In: Proceedings of the ACM SIGCOMM Internet Measurement Conference (2004)

    Google Scholar 

  6. Provos, N.: A virtual honeypot framework. In: Proceedings of USENIX Security Symposium (2004)

    Google Scholar 

  7. Rajab, M.A., Monrose, F., Terzis, A.: Fast and evasive attacks: Highlighting the challenges ahead. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 206–225. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  8. Shinoda, Y., Ikai, K., Itoh, M.: Vulnerabilities of Passive Internet Threat Monitors. In: Proceedings of USENIX Security Symposium (2005)

    Google Scholar 

  9. Staniford, S., Paxson, V., Weaver, N.: How to 0wn the Internet in Your Spare Time. In: Proceedings of the 11th USENIX Security Symposium (2002)

    Google Scholar 

  10. Ullrich, J.: Dshield (2005), http://www.dshield.org

  11. Vrable, M., Ma, J., Chen, J., Moore, D., Vandekieft, E., Snoeren, A., Voelker, G., Savage, S.: Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm. In: Proceedings of ACM SOSP 2005, Brighton, UK (October 2005)

    Google Scholar 

  12. Yegneswaran, V., Alfeld, C., Barford, P., Cai, J.-Y.: Camouflaging Honeynets. In: Proceedings of IEEE Global Internet Symposium (2007)

    Google Scholar 

  13. Yegneswaran, V., Barford, P., Plonka, D.: On the Design and Use of Internet Sinks for Network Abuse Monitoring. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 146–165. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cai, JY., Yegneswaran, V., Alfeld, C., Barford, P. (2009). An Attacker-Defender Game for Honeynets. In: Ngo, H.Q. (eds) Computing and Combinatorics. COCOON 2009. Lecture Notes in Computer Science, vol 5609. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02882-3_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02882-3_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02881-6

  • Online ISBN: 978-3-642-02882-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics