Skip to main content

Honeynets: Foundations for the Development of Early Warning Information Systems

  • Conference paper
Cyberspace Security and Defense: Research Issues

Part of the book series: NATO Science Series II: Mathematics, Physics and Chemistry ((NAII,volume 196))

Abstract

This paper aims at presenting in some depth the “Leurré.com” project and its first results. The project aims at deploying so-called low level interaction honeypot platforms all over the world to collect in a centralized database a set of information amenable to the analysis of today's Internet threats. At the time of this writing, around two dozens platforms have been deployed in the five continents. The paper offers some insight into the findings that can be derived from such data set. More importantly, the design and the structure of the repository are presented and justified by means of several examples that highlight the simplicity and efficiency of extracting useful information out of it. We explain why such low cost, largely distributed system represents an important, foundational element, towards the building of early warning information systems.

This research is supported by a research contract with France Telecom R&D, Contract Number 46127561

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

7. References

  1. WORM 2004, The 2nd Workshop on Rapid Malcode, held in Association with the 11th ACM Conference on Computer and Communication Security CCS, Oct. 2004, VA, USA, home page at: http://www.acm.org/sigs/sigsac/ccs/CCS2004/worm.html

    Google Scholar 

  2. DIMVA 2004, The Detection of Intrusions and Malware & Vulnerability Assessment, July 2004, Dortmund, Germany, home page at: http://www.dimva.org/dimva2005

    Google Scholar 

  3. SRUTI: Steps to Reducing Unwanted Traffic on the Internet, Usenix Workshop, July 2005, MA USA, home page at: http://nms.lcs.mit.edu/~dina/SRUTI/

    Google Scholar 

  4. Staniford, S., V. Paxson, and N. Weaver, “How to Own the Internet in Your Spare Time.” In the Proceedings of the 11th USENIX Security Symposium, pages 149–167, USENIX Association, 2002.

    Google Scholar 

  5. Chen, Z., L. Gao, and K. Kwiat, “Modeling the Spread of Active Worms,” in the Proceedings of the IEEE INFOCOM 2003, April 2003, CA, USA.

    Google Scholar 

  6. Zou, C. C., W. Gong, and D. Towsley, “Worm Propagation Modeling and Analysis Under Dynamic Quarantine Defense,” in Proceedings of the 1st Workshop on Rapid Malcode (WORM'03), Oct. 2003, WA, USA.

    Google Scholar 

  7. Spafford, E., “The Internet Worm Program: An Analysis,” Purdue Technical Report CSD-TR-823, West Lafayette, IN 47907-2004, 1988.

    Google Scholar 

  8. Moore, D., C. Shannon, G.M. Voelker, and S. Savage, “Code Red, a Case Study on the Spread and Victims of an Internet Worm,” in Proceedings of the ACM/USENIX Internet Measurement Workhop, Nov. 2002.

    Google Scholar 

  9. McAFEE Security Antivirus. “Virus Profile: W32/deloder worm.” Available at: http://us.mcafee.com/virusInfo/

    Google Scholar 

  10. F-Secure Corporation. “Deloder worm analysis.” Available at: http://www.fsecure.com

    Google Scholar 

  11. McHugh J., “Sets, Bags, and Rock and Roll Analyzing Large Data Sets of Network Data,” in Proceedings of the 9th European Symposium on Research in Computer Security USENIX'04, Sept. 2004, Sophia-Antipolis, France.

    Google Scholar 

  12. Honeyd Virtual Honeypot from N. Provos, home page: http://www.honeyd.org

    Google Scholar 

  13. Dacier, M., F. Pouget, and H. Debar. “Honeypots, A Practical Mean to Validate Malicious Fault Assumptions,” in Proceedings of the 10th Pacific Ream Dependable Computing Conference (PRDC'04), Feb. 2004.

    Google Scholar 

  14. Pouget, F. and M. Dacier. “Honeypot-based Forensics,” in Proceedings of the AusCERT Asia Pacific Information Technology Security Conference 2004 (AusCERT2004), May 2004, Australia.

    Google Scholar 

  15. Pouget, F., M. Dacier, and V.H. Pham, “Understanding Threats: a Prerequisite to Enhance Survivability of Computing Systems,” in Proceedings of the International Infrastructure Survivability Workshop (IISW 2004), Dec. 2004, Portugal.

    Google Scholar 

  16. Pouget, F., M. Dacier, and H. Debar, “Attack Processes found on the Internet,” in Proceedings of the NATO Symposium IST-041/RSY-013, April 2004, France.

    Google Scholar 

  17. VMWare Corporation. User's Manual version 4.1 available at: http://www.vmware.com

    Google Scholar 

  18. TCPDUMP utility home page: http://www.tcpdump.org

    Google Scholar 

  19. LEURRE.COM, the Eurecom Honeypot Project home page: http://www.eurecom.fr/~pouget/leurrecom.html

    Google Scholar 

  20. Pouget, F., M. Dacier, and V.H. Pham, “On the Advantages of Deploying a Large Scale Distributed Honeypot Platform,” to appear in the Proceedings of the E-Crime and Computer Evidence Conference 2005, Monaco, Feb. 2005.

    Google Scholar 

  21. Garcia-Molina, H., J. D. Ullman, and J. D. Widom, “Database Systems: the Complete Book,” 2002.

    Google Scholar 

  22. Ullman, J. D., “A First Course in Database Systems,” 2nd Edition, 1989.

    Google Scholar 

  23. SNORT Intrusion Detection Sytem home page: http://www.snort.org

    Google Scholar 

  24. MySQL Open Source Database home page: http://www.mysql.com

    Google Scholar 

  25. “Blacklist Scanner” in Security Focus Home Tools: http://www.securityfocu.com/tools/1962

    Google Scholar 

  26. CAIDA Project. “Netgeo utility-the Internet geographical database,” home page: http://www.caida.org/tools/utilities/netgeo/

    Google Scholar 

  27. Rosin, A., “Measuring Availability in Peer-to-Peer Networks,” Sept. 2003, available at: http://www.wiwi.hu-berlin.de/fis/p2pe/paper_A_Rosin.pdf

    Google Scholar 

  28. Zeitoun, A., C. N. Chuah, S. Bhattacharyya, and C. Diot, “An AS-level study of Internet path delay characteristics,” technical report, 2003, available at: http://ipmon.sprint.com/pubs_trs/trs/RR03-ATL-051699-AS-delay.pdf

    Google Scholar 

  29. Hook, S. H., H. Jeong, and A.L. Barabasi, “Modeling the Internet's large scale topology,” in PNAS —vol. 99, Oct. 2002, available at: http://www.nd.edu/networks/PDF/Modeling

    Google Scholar 

  30. Eugene, T. S., Ng, and H. Zhang, “Predicting Internet Network Distance with Coordinates-based Approaches,” in Proceedings of INFOCOM 2002, available at: http://www-2.cs.cmu.edu/eugeneng/papers/INFOCOM02.pdf

    Google Scholar 

  31. MaxMind GeoIP Country Database Commercial Product, home page: http://www.maxmind.com/app/products

    Google Scholar 

  32. IP2location products, home page: http://www.ip2location.com

    Google Scholar 

  33. GeoBytes IP Address Locator Tool, home page: http://www.geobytes.com/IPLocator.htm

    Google Scholar 

  34. ISO 3166-1 alpha-2, Introduction to the 2-letter code for countries names, available at: http://encyclopedia.thefreedictionary.com/ISO%203166-1

    Google Scholar 

  35. Symantec Antivirus Corporation. Symantec Security Response w32.welchia.worm, 2004, available at http://response.symantec.com/avcentr/venc/data/w32.welchia.b.worm.html

    Google Scholar 

  36. “Internet Worm squirms into Linux Servers,” CNET tech report available at: http://news.com.com/2100-1001-251071.html?legacy=cnet

    Google Scholar 

  37. “Ramen Linux Worm seen in Wild,” InfoWorld News available at: http://www.infoworld.com/articles/hn/xml/01/01/25/010125hnramen.html?p=br=3

    Google Scholar 

  38. Disco Passive Fingerprinting Tool home page: http://www.altmode.com/disco

    Google Scholar 

  39. P0f Passive Fingerprinting Tool, version 2.0 home page: http://lcamtuf.coredump.cx/p0f-beta.tgz

    Google Scholar 

  40. Ettercap NG-0.7.1 Sourceforge Project available at: http://ettercap.sourceforge.net

    Google Scholar 

  41. Comprehensive Perl Archive Network CPAN home page: http://www.cpan.org

    Google Scholar 

  42. “Exchanging Routing Information Across Provider Boundaries in the CIDR Environment,” IETF RFC 1520, available at: http://www.ietf.org/rfc/rfc1520.txt

    Google Scholar 

  43. CAIDA Project: The UCSD Network Telescope, http://www.caida.org/outreach/papers/2001/BackScatter/

    Google Scholar 

  44. Moore, D., G. Voelker, and S. Savage, “Infering Internet Denial-of-Service activity,” in Proceedings of the 2001 USENIX Security Symposium, Aug. 2001, CA, USA.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer

About this paper

Cite this paper

Pouget, F., Dacier, M., Pham, V., Debar, H. (2005). Honeynets: Foundations for the Development of Early Warning Information Systems. In: Kowalik, J.S., Gorski, J., Sachenko, A. (eds) Cyberspace Security and Defense: Research Issues. NATO Science Series II: Mathematics, Physics and Chemistry, vol 196. Springer, Dordrecht. https://doi.org/10.1007/1-4020-3381-8_13

Download citation

  • DOI: https://doi.org/10.1007/1-4020-3381-8_13

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-3379-7

  • Online ISBN: 978-1-4020-3381-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics