Honeypot-based forensics

Pouget, Fabien; Dacier, Marc
AusCERT 2004, AusCERT Asia Pacific Information technology Security Conference 2004, 23-27 May 2004, Brisbane, Australia

Some attacks on honeypots are very frequent and repetitive. In addition, such repetitive attacks generate a very large amount of data. In this paper, we show that it might be misleading to consider general statistics obtained on these data without carrying an in depth analysis of the various processes that have led to their creation. We show that such analysis can be done by means of a simple clustering approach. We present an algorithm to characterize the root causes of these attacks. This algorithm enables us to obtain precious and non trivial information to identify the various attacks targeting our environment. We use this algorithm to identify root causes of the data collected from our honeypot environment. We demonstrate that identifying the root causes is a prerequisite for a better understanding of malicious activity observed thanks to honeypots environments. Finally, we hope this work will open new avenues for the ongoing work related to honeynets.

Sécurité numérique
Eurecom Ref:
See also:

PERMALINK : https://www.eurecom.fr/publication/1417