Defending Cyberspace with Fake Honeypots

被引:36
|
作者
Rowe, Neil C. [1 ]
Custy, E. John [2 ]
Duong, Binh T. [2 ]
机构
[1] US Naval, Postgrad Sch, Code CS Rp, Monterey, CA 93943 USA
[2] US Navy, SPAWAR Syst Ctr, San Diego, CA 92152 USA
关键词
honeypots; deception; intrusion-detection systems; defense; signatures;
D O I
10.4304/jcp.2.2.25-36
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Honeypots are computer systems designed for no purpose other than recording attacks on them. Cyberattackers should avoid them since honeypots jeopardize the secrecy of attack methods and it is hard to launch attacks from them. This suggests that a computer system might pretend to be a honeypot to scare away attackers, reducing the number of attacks and their severity. This could be done on ordinary computer systems as a kind of "vaccination" of those systems, to create what we call "fake honeypots". After some background, we examine this idea from three perspectives. We develop a mathematical model of what would make an attacker go away. We report experiments with deliberate distortions on text to see at what point people could detect deception, and discover they can respond to subtle clues. We then report experiments with real attackers against a honeypot. Results show that attacks on it decreased over time (which may indicate that attackers are being scared away), irregular outages of the honeypot stimulated attacks, and other changes occurred in response to our manipulations. We conclude with some speculation about the escalation of honeypot-antihoneypot techniques.
引用
收藏
页码:25 / 36
页数:12
相关论文
共 50 条
  • [1] Fake honeypots: A defensive tactic for cyberspace
    Rowe, Neil C.
    Duong, Binh T.
    Custy, E. John
    [J]. 2006 IEEE INFORMATION ASSURANCE WORKSHOP, 2006, : 223 - +
  • [2] Defending cyberspace
    Saydjari, OS
    [J]. COMPUTER, 2002, 35 (12) : 125 - 125
  • [3] The Credential is Not Enough: Deception with Honeypots and Fake Credentials
    Cromp, Sonia
    Bilinski, Mark
    Gabrys, Ryan
    Sala, Frederic
    [J]. DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2023, 2023, 14167 : 234 - 254
  • [4] Defending Against Neural Fake News
    Zellers, Rowan
    Holtzman, Ari
    Rashkin, Hannah
    Bisk, Yonatan
    Farhadi, Ali
    Roesner, Franziska
    Choi, Yejin
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 32 (NIPS 2019), 2019, 32
  • [5] Is CS Really for All, and Defending Democracy in Cyberspace
    Guzdial, Mark
    Arquilla, John
    [J]. COMMUNICATIONS OF THE ACM, 2019, 62 (06) : 8 - 9
  • [6] Poe in Cyberspace: How Much of the Internet Is Fake?
    Ehrlich, Heyward
    [J]. EDGAR ALLAN POE REVIEW, 2019, 20 (02): : 324 - 328
  • [7] Poe in Cyberspace: "Fake it till you make it"
    Ehrlich, Heyward
    [J]. EDGAR ALLAN POE REVIEW, 2022, 23 (01): : 87 - 94
  • [8] Cyberspace Exercises: Defending against Malicious Cyber Actors
    Bennett, Kelly
    Robertson, James
    [J]. ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR MULTI-DOMAIN OPERATIONS APPLICATIONS V, 2023, 12538
  • [9] DEFENDING CYBERSPACE: REEXAMINING SECURITY METAPHORS IN THE INTERNET ERA
    Yang, Misti
    [J]. RHETORIC & PUBLIC AFFAIRS, 2020, 23 (04) : 707 - 733
  • [10] The Art of False Alarms in the Game of Deception: Leveraging Fake Honeypots for Enhanced Security
    Zarras, Apostolis
    [J]. 2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,