DocumentCode :
2234942
Title :
Fake Honeypots: A Defensive Tactic for Cyberspace
Author :
Rowe, Neil C. ; Duong, Binh T. ; Custy, E. John
Author_Institution :
US Naval Postgraduate Sch., Monterey, CA
fYear :
2006
fDate :
21-23 June 2006
Firstpage :
223
Lastpage :
230
Abstract :
Cyber-attackers are becoming more aware of honeypots. They generally want to avoid honeypots since it is hard to spread attacks from them, attacks are thoroughly monitored on them, and some honeypots contain planted false information. This suggests that it could be useful for a computer system to pretend it is a honeypot, to scare away smarter attackers. We examine here from a number of perspectives how this could be accomplished as a kind of "vaccination" of systems to reduce numbers of attacks and their severity. We develop a mathematical model of what would make an attacker go away. We report experiments with deliberate distortions on text to see at what point people could detect deception, and discover they can respond to subtle clues. We also report experiments with real attackers against a honeypot of increasing obviousness. Results show that attacks on it decreased over time which may indicate that attackers are being scared away. We conclude with some speculation about the escalation of honeypot-antihoneypot techniques
Keywords :
computer crime; computer networks; computer system; cyber-attackers; cyberspace; fake honeypots; mathematical model; Books; Computer hacking; Computer networks; Computerized monitoring; Government; Internet; Mathematical model; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance Workshop, 2006 IEEE
Conference_Location :
West Point, NY
Print_ISBN :
1-4244-0130-5
Type :
conf
DOI :
10.1109/IAW.2006.1652099
Filename :
1652099
Link To Document :
بازگشت