Skip to main content

Survival by Deception

  • Conference paper
Computer Safety, Reliability, and Security (SAFECOMP 2007)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4680))

Included in the following conference series:

Abstract

A system with a high degree of availability and survivability can be created via service duplication on disparate server platforms, where a compromise via a previously unknown attack is detected by a voting mechanism. However, shutting down the compromised component will inform the attacker that the subversion attempt was unsuccessful, and might lead her to explore other avenues of attack. This paper presents a better solution by transforming the compromised component to a state of honeypot; removing it from duty, while providing the attacker with bogus data. This provides the administrator of the target system with extra time to implement adequate security measures while the attacker is busy “exploiting” the honeypot. As long as the majority of components remain uncompromised, the system continues to deliver service to legitimate users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Ranum, M.J.: Thinking about firewalls. In: Proceedings of Second International Conference on Systems and Network Security and Management (SANS-II) (April 1994)

    Google Scholar 

  2. Spitzner, L.: Honeypots – Tracking Hackers. Addison-Wesley, Reading (2003)

    Google Scholar 

  3. The Honeynet Project, Know Your Enemy – Revealing the Security Tools, Tactics and Motives of the Blachat Community, Addison-Wesley, Reading (2002)

    Google Scholar 

  4. Baecher, P., Koetter, M., Holz, T., Dornseif, M., Freiling, F.: The nepenthes platform: An efficient approach to collect malware. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 165–184. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  5. Pouget, F., Holz, T.: A pointillist approach for comparing honeypots. In: Julisch, K., Krügel, C. (eds.) DIMVA 2005. LNCS, vol. 3548, pp. 51–68. Springer, Heidelberg (2005)

    Google Scholar 

  6. The HoneyNet Project. [Online]. Available: http://www.honeynet.org

  7. Cheswick, B.: An evening with Berferd in which a cracker is lured, endured, and studied. In: USENIX Conference Proceedings, pp. 163–174. USENIX (1992)

    Google Scholar 

  8. Stoll, C.: Stalking the wily hacker. Communications of the ACM 31(5), 484–497 (1988)

    Article  MathSciNet  Google Scholar 

  9. Jaatun, M.G., Hallingstad, G.: Techniques for increasing survivability in NATO CIS. In: proceedings of the 1st European Survivability Workshop, February 2002, Köln-Wahn, Germany (2002)

    Google Scholar 

  10. Laprie, J.-C.: Dependable computing and fault-tolerance: Concepts and terminology. In: Proceedings of the 15th International Symposium on Fault-Tolerant Computing (FTCS-15), pp. 2–11 (1985)

    Google Scholar 

  11. Ellison, R.J., Fisher, D.A., Linger, R.C., Lipson, H.F., Longstaff, T., Mead, N.R.: Survivable network systems: An emerging discipline. Sofware Engineering Institute (SEI), Carnegie Mellon University, Tech. Rep. CMU/SEI-97-TR-013 (1997-1999)

    Google Scholar 

  12. Wang, F., Gong, F., Sargor, C., Goseva-Popstojana, Trivedi, K., Jou, F.: SITAR - a Scalable Intrusion-Tolerant Architecture for Distributed Services. In: proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, June 2001, pp. 38–45. IEEE Computer Society Press, Los Alamitos (2001)

    Google Scholar 

  13. Bait and Switch Honeypot.[Online]. Available: http://baitnswitch.sourceforge.net/

  14. Snort - a network intrusion detection system. [Online]. Available: http://www.snort.org

  15. Anagnostakis, K., Sidiroglou, S., Akritidis, P., Xinidis, K., Markatos, E., Keromytis, A.: Detecting targeted attacks using shadow honeypots. ICS-FORTH, Crete, Greece, Tech. Rep. TR-348 (January 2005)

    Google Scholar 

  16. Broen, T.: Innbruddstolerante systemer: En eksperimentell utprøving og vurdering. Master’s thesis, University of Oslo, Norway (May 2005)

    Google Scholar 

  17. Hoglund, G., Butler, J.: Rootkits, 1st edn. Addison-Wesley, Reading (2006)

    Google Scholar 

  18. Labs,S.: The Samhain file integrity system user manual, available from http://la-samhna.de/samhain/manual

  19. Bace, R.G.: Intrusion Detection. Macmillian Technical Publishing (2000)

    Google Scholar 

  20. Northcutt, S., Novak, J.: Network Intrusion Detection, 3rd edn. New Riders Publishing (2002)

    Google Scholar 

  21. Ashrafi, N., Berman, O., Cutler, M.: Optimal-design of large software-systems using n-version programming. IEEE Transactions on Reliability 43(2), 344–350 (1994)

    Article  Google Scholar 

  22. Wang, L., Dasgupta, P.: Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System. In: Proceedings of the Third IEEE International Symposium on Security in Networks and Distributed Systems, IEEE Computer Society Press, Los Alamitos (to appear, 2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Francesca Saglietti Norbert Oster

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jaatun, M.G., Nyre, Å.A., Sørensen, J.T. (2007). Survival by Deception. In: Saglietti, F., Oster, N. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2007. Lecture Notes in Computer Science, vol 4680. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75101-4_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75101-4_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75100-7

  • Online ISBN: 978-3-540-75101-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics