Skip to main content

Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection

  • Conference paper
  • First Online:
Computer Networks (CN 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 522))

Included in the following conference series:

Abstract

New threats from the Internet emerging every day need to be analyzed in order to prepare ways of protection against them. Various honeypots combined into honeynets are the most efficient tool how to lure, detect and analyze threats from the Internet. The paper presents recent results in honeynet made of Dionaea (emulating Windows services), Kippo (emulating Linux services) and Glastopf (emulating website services) honeypots. The most important result consists in the fact that the differentiation among honeypots according to their IP address is relatively rough (usually two categories, i.e. academic and commercial networks, are usually distinguished, but the type of services in commercial sites is taken into account, too). Comparisons of results to other similar honeynets confirms the validity of the paper main conclusions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    http://dionaea.carnivore.it.

  2. 2.

    http://code.google.com/p/kippo.

  3. 3.

    http://glastopf.org/.

  4. 4.

    https://www.watchguard.com/products/reputation-authority.asp.

  5. 5.

    http://packetstormsecurity.com/files/125252.

References

  1. Kheirkhah, E., et al.: An experimental study of SSH attacks by using honeypot decoys. Indian J. Sci. Tech. 6(12), 5567–5578 (2013)

    Google Scholar 

  2. Sochor, T., Zuzcak, M.: Study of internet threats and attack methods using honeypots and honeynets. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2014. CCIS, vol. 431, pp. 118–127. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  3. Reynolds, J., Postel, J.: Assigned numbers. IETF. RFC 1340 (1992). http://www.rfc-editor.org/rfc/rfc1340.txt

  4. Spitzner, L.: Honeypots: Tracking Hackers. Addison-Wesley, Boston (2002)

    Google Scholar 

  5. Joshi, R.C., Sardana, A.: Honeypots: A New Paradigm to Information Security. Science Publishers (2011)

    Google Scholar 

  6. Grudziecki, T., et al.: Proactive detection of security incidents honeypots. In: ENISA (2012). https://www.enisa.europa.eu/activities/cert/support/proactive-detection/proactive-detection-of-security-incidents-II-honeypots/at_download/fullReport

  7. Pisarcik, P., Sokol, P.: Framework for distributed virtual honeynets. In: Proceedings of the 7th International Conference on Security of Information and Networks, p. 324. ACM (2014)

    Google Scholar 

  8. Zacek, J., Hunka, F.: CEM: class executing modeling. Procedia Comput. Sci. 2011, 1597–1601 (2011)

    Article  Google Scholar 

  9. Sokol, P.: Legal issues of honeynet’s generations. In: IWSSS 2014. Bucharest (2014)

    Google Scholar 

  10. Sokol, P., Zuzcak, M., Sochor, T.: Definition of attack in the context of low-level interaction server honeypots. In: Park, J.J.J.H., Stojmenovic, I., Jeong, H.Y., Yi, G. (eds.) Computer Science and Its Applications. LNEE, vol. 330, pp. 499–504. Springer, Heidelberg (2015)

    Chapter  Google Scholar 

  11. Pomorova, O., Savenko, O., Lysenko, S., Kryshchuk, A., Nicheporuk, A.: A technique for detection of bots which are using polymorphic code. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2014. CCIS, vol. 431, pp. 265–276. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  12. Wheeler, D.A.: Shellshock (2015). http://www.dwheeler.com/essays/shellshock.html

Download references

Acknowledgment

The publication was supported by Fuzzy modeling tools for adaptive search burdened with indeterminacy and system behavior prediction project of the Student Grant Competition of the University of Ostrava. Thanks belong to the Center of Information Technologies of the University of Ostrava, and to Spojena skola in Kysucke Nove Mesto for providing the connection for research honeypots. Thanks are expressed to the Institute of Informatics of the Silesian University of Technology and Polish Chapter of The Honeynet Project and CERT-PL for providing the data, and The Honeynet Project, Czech Chapter, for consulting.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tomas Sochor .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Sochor, T., Zuzcak, M. (2015). Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection. In: Gaj, P., Kwiecień, A., Stera, P. (eds) Computer Networks. CN 2015. Communications in Computer and Information Science, vol 522. Springer, Cham. https://doi.org/10.1007/978-3-319-19419-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19419-6_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19418-9

  • Online ISBN: 978-3-319-19419-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics