Skip to main content

The DecoyPort: Redirecting Hackers to Honeypots

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNISA,volume 4658)

Abstract

Most of computer security systems use the signatures of well-known attacks to detect hackers’ attacks. For these systems, it is very important to get the accurate signatures of new attacks as soon as possible. For this reason, there have been several researches on honeypots. However, honeypots can not collect information about hackers attacking active computers except themselves. In this paper, we propose the DecoyPort system to redirect hackers toward honeypots. The DecoyPort system creates the DecoyPorts on active computers. All interactions with the DecoyPorts are considered as suspect because the ports are not those for real services. Accordingly, every request sent to the DecoyPorts is redirected to honeypots by the DecoyPort system. Consequently, our system enables honeypots to collect information about hackers attacking active computers except themselves.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Roesch, M.: Snort-Lightweight Intrusion Detection for Networks. In: Proceedings of the LISA 1999:13th Systems Administration Conference, pp. 229–238 (1999)

    Google Scholar 

  2. Laing, B., Alderson, J.: How to Guide: Implementing a Network Based Intrusion Detection System. Internet Security Systems (2000), http://www.snort.org/docs/iss-placement.pdf

  3. Spitzner, L.: Know Your Enemy: Sebek2 A Kernel Based Data Capture Tool (2003), http://www.honeynet.org/

  4. He, X.-Y., Lam, K.-Y., Chung, S.-L., Chi, C.-H., Sun, J.-G.: Real-Time Emulation of Intrusion Victim in HoneyFarm. In: Chi, C.-H., Lam, K.-Y. (eds.) AWCC 2004. LNCS, vol. 3309, pp. 143–154. Springer, Heidelberg (2004)

    Google Scholar 

  5. Kim, M., Kim, M., Mun, Y.: Design and Implementation of the HoneyPot System with Focusing on the Session Redirection. In: Laganà, A., Gavrilova, M., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 262–269. Springer, Heidelberg (2004)

    Google Scholar 

  6. John, G., Levine, J.B., Grizzard, H.L.: Owen: Using Honeynets to Protect Large Enterprise Networks. IEEE Security and Privacy 2, 74–75 (2004)

    Google Scholar 

  7. Spitzner, L.: Honeypots: Tracking Hackers. Addison-Wesley, Reading (2003)

    Google Scholar 

  8. Spitzner, L.: Honeypot Farms (2003), http://www.securityfocus.com/infocus/1720

  9. Werner, T.: honeytrap - trap attacks against tcp services, http://honeytrap.sourceforge.net/start.html

  10. Fyodor,: The Art of Port Scanning. Phrack Magazine 7(51) Article 11 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Tomoya Enokido Leonard Barolli Makoto Takizawa

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, I., Kim, M. (2007). The DecoyPort: Redirecting Hackers to Honeypots. In: Enokido, T., Barolli, L., Takizawa, M. (eds) Network-Based Information Systems. NBiS 2007. Lecture Notes in Computer Science, vol 4658. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74573-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74573-0_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74572-3

  • Online ISBN: 978-3-540-74573-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics