Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning
- Cite this paper as:
- Lengyel T.K., Neumann J., Maresca S., Kiayias A. (2013) Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning. In: Lopez J., Huang X., Sandhu R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg
We present a scalable honeynet system built on Xen using virtual machine introspection and cloning techniques to efficiently and effectively detect intrusions and extract associated malware binaries. By melding forensics tools with live memory introspection, the system is resistant to prior in-guest detection techniques of the monitoring environment and to subversion attacks that may try to hide aspects of an intrusion. By utilizing both copy-on-write disks and memory to create multiple identical high-interaction honeypot clones, the system relaxes the linear scaling of hardware requirements typically associated with scaling such setups. By employing a novel routing approach our system eliminates the need for post-cloning network reconfiguration, allowing the clone honeypots to share IP and MAC addresses while providing concurrent and quarantined access to the network. We deployed our system and tested it with live network traffic, demonstrating its effectiveness and scalability.
KeywordsHoneypot Honeynet Introspection Virtual Machine Network Security Memory Forensics Malware Analysis
Unable to display preview. Download preview PDF.