Title :
Real-time distributed malicious traffic monitoring for honeypots and network telescopes
Author :
Hunter, Samuel Oswald ; Irwin, Barry ; Stalmans, Etienne
Author_Institution :
SensePost, Tshwane, South Africa
Abstract :
Network telescopes and honeypots have been used with great success to record malicious network traffic for analysis, however, this is often done off-line well after the traffic was observed. This has left us with only a cursory understanding of malicious hosts and no knowledge of the software they run, uptime or other malicious activity they may have participated in. This work covers a messaging framework (rDSN) that was developed to allow for the real-time analysis of malicious traffic. This data was captured from multiple, distributed honeypots and network telescopes. Data was collected over a period of two months from these data sensors. Using this data new techniques for malicious host analysis and re-identification in dynamic IP address space were explored. An Automated Reconnaissance (AR) Framework was developed to aid the process of data collection, this framework was responsible for gathering information from malicious hosts through both passive and active fingerprinting techniques. From the analysis of this data; correlations between malicious hosts were identified based on characteristics such as Operating System, targeted service, location and services running on the malicious hosts. An initial investigation in Latency Based Multilateration (LBM), a novel technique to assist in host re-identification was tested and proved successful as a supporting metric for host re-identification.
Keywords :
computer network reliability; computer network security; telecommunication traffic; LBM; active fingerprinting techniques; automated reconnaissance framework; data sensors; distributed honeypots; dynamic IP address space; host reidentification; latency based multilateration; malicious activity; malicious hosts; messaging framework; network telescopes; passive fingerprinting techniques; rDSN; real-time distributed malicious traffic monitoring; real-time malicious traffic analysis; Base stations; Grippers; IP networks; Internet; Real-time systems; Sensors; Telescopes; data mining; monitoring; remote fingerprinting; situational awareness;
Conference_Titel :
Information Security for South Africa, 2013
Conference_Location :
Johannesburg
DOI :
10.1109/ISSA.2013.6641050