TY - JOUR
T1 - A new procedure to detect low interaction honeypots
AU - Aguirre-Anaya, Eleazar
AU - Gallegos-Garcia, Gina
AU - Luna, Nicolás Solano
AU - Vargas, Luis Alfonso Villa
N1 - Publisher Copyright:
Copyright © 2014 Institute of Advanced Engineering and Science. All rights reserved.
PY - 2014/12/1
Y1 - 2014/12/1
N2 - Honeypots systems are an important piece of the network security infrastructure and can be deployed to accomplish different purposes such as: network sensing, capturing and learning about 0-day exploits, capturing and analyzing of black hat techniques, deterring black hats and data gathering for doing statistical analysis over the Internet traffic, among others. Nevertheless, all honeypots need to look like real systems, due to if a honeypot is unmasked, it loses its value. This paper presents a new procedure to detect low interaction honeypots, through HTTP request, regardless honeypot architecture. It is important to mention that Low Interaction Honeypots network services need to be improved in order to get trustworthy information. Otherwise, it should consider data obtained by low interaction honeypots like inaccurate and unreliable information.
AB - Honeypots systems are an important piece of the network security infrastructure and can be deployed to accomplish different purposes such as: network sensing, capturing and learning about 0-day exploits, capturing and analyzing of black hat techniques, deterring black hats and data gathering for doing statistical analysis over the Internet traffic, among others. Nevertheless, all honeypots need to look like real systems, due to if a honeypot is unmasked, it loses its value. This paper presents a new procedure to detect low interaction honeypots, through HTTP request, regardless honeypot architecture. It is important to mention that Low Interaction Honeypots network services need to be improved in order to get trustworthy information. Otherwise, it should consider data obtained by low interaction honeypots like inaccurate and unreliable information.
KW - Fingerprint
KW - Honeypot systems
KW - Low interaction
KW - Remote network systems
KW - Signatures
UR - http://www.scopus.com/inward/record.url?scp=84928548735&partnerID=8YFLogxK
U2 - 10.11591/ijece.v4i6.6885
DO - 10.11591/ijece.v4i6.6885
M3 - Artículo
SN - 2088-8708
VL - 4
SP - 848
EP - 857
JO - International Journal of Electrical and Computer Engineering
JF - International Journal of Electrical and Computer Engineering
IS - 6
ER -