skip to main content
10.1145/3592307.3592325acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiceccConference Proceedingsconference-collections
research-article

Honeypot Detection Method Based on Anomalous Requests Response Differences

Authors Info & Claims
Published:14 August 2023Publication History

ABSTRACT

Honeypot detection is a popular technology in the current cyber security, which can be used to check the disguise and protection level of deployed honeypots. To address the problem of low detection accuracy of existing honeypot detection techniques, this paper proposes a honeypot detection method based on the differences of anomalous requests’ response. The method uses the anomalous request packet construction method designed in this paper to construct anomalous request packets, and sends the constructed anomalous request packets to the identity-known devices to collect the responses. Combined with the responses analysis method designed in this paper, the responses are analyzed in terms of similarity in both content and structure dimensions, which enables the evaluation of anomalous request packets in turn, and the selection of those that can consistently trigger a differential response from the honeypots to form a probing packets set based on anomaly. A deep learning model aiming at honeypot detection is designed using the responses of the identity-known devices in response to the probing packets set based on anomaly. The model and the responses of the nodes to detect to the probing packets set based on anomaly are used to detect honeypots. Experiment shows that the method is able to detect the nodes to detect with an accuracy of 96.4%.

References

  1. Chuanlin Wang, Anning Shang. Preliminary study on the development of honeypot technology [J]. Information security and communication confidentiality, 2008(8):3.Google ScholarGoogle Scholar
  2. T. Holz and F. Raynal, "Detecting honeypots and other suspicious environments," Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, 2005, pp. 29-36, doi: 10.1109/IAW.2005.1495930.Google ScholarGoogle ScholarCross RefCross Ref
  3. Ping Wang, Lei Wu, Ryan Cunningham, and Cliff C. Zou. 2010. Honeypot detection in advanced botnet attacks. Int. J. Inf. Comput. Secur. 4, 1 (February 2010), 30–51. https://doi.org/10.1504/IJICS.2010.031858Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Osama Hayatle, Amr Youssef, and Hadi Otrok. 2012. Dempster-Shafer Evidence Combining for Anti-Honeypot Technologies. Inf. Sec. J.: A Global Perspective 21, 6 (2012), 306–316. https://doi.org/10.1080/19393555.2012.738375Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Morishita , "Detect Me If You… Oh Wait. An Internet-Wide View of Self-Revealing Honeypots," 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2019, pp. 134-143.Google ScholarGoogle Scholar
  6. Srinivasa, Shreyas “Gotta catch 'em all: a Multistage Framework for honeypot fingerprinting.” ArXiv abs/2109.10652 (2021): n. pag.Google ScholarGoogle Scholar
  7. S. Mukkamala, K. Yendrapalli, R. Basnet, M. K. Shankarapani and A. H. Sung, "Detection of Virtual Environments and Low Interaction Honeypots," 2007 IEEE SMC Information Assurance and Security Workshop, 2007, pp. 92-98, doi: 10.1109/IAW.2007.381919.Google ScholarGoogle ScholarCross RefCross Ref
  8. Papazis, K., Chilamkurti, N. Detecting indicators of deception in emulated monitoring systems. SOCA 13, 17–29 (2019). https://doi.org/10.1007/s11761-018-0252-2Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Alexander Vetterl and Richard Clayton. 2018. Bitter harvest: systematically fingerprinting low- and medium-interaction honeypots at internet scale. In Proceedings of the 12th USENIX Conference on Offensive Technologies (WOOT'18). USENIX Association, USA, 9.Google ScholarGoogle Scholar
  10. Cheng Huang, Jiaxuan Han, Xing Zhang, Jiayong Liu, "Automatic Identification of Honeypot Server Using Machine Learning Techniques", Security and Communication Networks, vol. 2019, Article ID 2627608, 8 pages, 2019. https://doi.org/10.1155/2019/2627608Google ScholarGoogle ScholarCross RefCross Ref
  11. Murad Abdo Rassam and Mohd. Aizaini Maarof, "Artificial Immune Network Clustering approach for Anomaly Intrusion Detection," Journal of Advances in Information Technology, Vol. 3, No. 3, pp. 147-154, August, 2012.doi:10.4304/jait.3.3.147-154Google ScholarGoogle ScholarCross RefCross Ref
  12. Kavitha B., Karthikeyan S., and Sheeba Maybell P., "Emerging Intuitionistic Fuzzy Classifiers for Intrusion Detection System," Journal of Advances in Information Technology, Vol. 2, No. 2, pp. 99-108, May, 2011.doi:10.4304/jait.2.2.99-108Google ScholarGoogle ScholarCross RefCross Ref
  13. Omar Al-Jarrah and Ahmad Arafat, "Network Intrusion Detection System Using Neural Network Classification of Attack Behavior," Vol. 6, No. 1, pp. 1-8, February, 2015. doi:10.12720/jait.6.1.1-8Google ScholarGoogle ScholarCross RefCross Ref
  14. Md. Badiuzzaman Pranto, Md. Hasibul Alam Ratul, Md. Mahidur Rahman, Ishrat Jahan Diya, and Zunayeed-Bin Zahir, "Performance of Machine Learning Techniques in Anomaly Detection with Basic Feature Selection Strategy - A Network Intrusion Detection System," Journal of Advances in Information Technology, Vol. 13, No. 1, pp. 36-44, February 2022.Google ScholarGoogle Scholar
  15. Siphesihle P. Sithungu and Elizabeth M. Ehlers, "GAAINet: A Generative Adversarial Artificial Immune Network Model for Intrusion Detection in Industrial IoT Systems," Journal of Advances in Information Technology, Vol. 13, No. 5, pp. 456-461, October 2022.Google ScholarGoogle Scholar
  16. Gunay Abdiyeva-Aliyeva and Mehran Hematyar, "Statistic Approached Dynamically Detecting Security Threats and Updating a Signature-Based Intrusion Detection System's Database in NGN," Journal of Advances in Information Technology, Vol. 13, No. 5, pp. 524-529, October 2022.Google ScholarGoogle Scholar
  17. Fielding R, Gettys J, Mogul J, RFC2616: Hypertext Transfer Protocol–HTTP/1.1 [J]. 1999.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Weiming Li, Aifang Zhang, Jiancai Liu, Zhitang Li. Automated fuzz testing vulnerability mining methods for network protocols [J]. Journal of Computer Science ,2011,34(02):242-255.Google ScholarGoogle Scholar
  19. Luo C, Zhan J, Xue X, Cosine normalization: Using cosine similarity instead of dot product in neural networks [C]//International Conference on Artificial Neural Networks. Springer, Cham, 2018: 382-391.Google ScholarGoogle Scholar
  20. Gulati A, Holler A, Ji M, Vmware distributed resource management: Design, implementation, and lessons learned [J]. VMware Technical Journal, 2012, 1(1): 45-64.Google ScholarGoogle Scholar
  21. Singh U, Garg U. An ASCII value based text data encryption System [J]. International Journal of Scientific and Research Publications, 2013, 3(11): bll 2250-3153.Google ScholarGoogle Scholar
  22. McCann J, Deering S, Mogul J, Path MTU Discovery for IP version 6 [R]. 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. CHN.Faker. Which is more scientific, Chinese or American rankings? [EB/OL]. [2022-10-04]. https://www.zhihu.com/question/422508480.Google ScholarGoogle Scholar
  24. Iandola F N, Han S, Moskewicz M W, SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and < 0.5 MB model size [J]. arXiv preprint arXiv:1602.07360, 2016.Google ScholarGoogle Scholar
  25. Yalta K, Ozturk S, Yetkin E. Golden Ratio and the heart: A review of divine aesthetics [J]. International journal of cardiology, 2016, 214: 107-112.Google ScholarGoogle ScholarCross RefCross Ref
  26. Berners-Lee T, Fielding R, Frystyk H. Hypertext transfer protocol–HTTP/1.0 [R]. 1996.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Fielding R, Gettys J, Mogul J, Hypertext transfer protocol–HTTP/1.1 [R]. 1999.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. Iyengar, Ed, QUIC: A UDP-Based Multiplexed and Secure Transport, draft-ietf-quic-transport-27, 21 February 2020; https://datatracker.ietf.org/doc/html/draft-ietf-quic-transport-27Google ScholarGoogle Scholar
  29. Fielding R, Reschke J. Hypertext transfer protocol (HTTP/1.1): Semantics and content [R]. 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Kalita L. Socket programming [J]. International Journal of Computer Science and Information Technologies, 2014, 5(3): 4802-4807.Google ScholarGoogle Scholar
  31. Pazzi Robotics. Express Honeypot [EB/OL]. 2022.1 [2022.8.31]. https://github.com/christophe77/express-honeypot.Google ScholarGoogle Scholar
  32. Kayos. HellPot [EB/OL]. 2022.4 [2022.8.31]. https://github.com/yunginnanet/HellPot.Google ScholarGoogle Scholar
  33. Markus Schmall. NodePot [EB/OL]. 2015.8 [2022.8.31]. https://github.com/schmalle/Nodepot.Google ScholarGoogle Scholar
  34. Leaden G, Zimmermann M, DeCusatis C, An API honeypot for DDoS and XSS analysis [C]//2017 IEEE MIT Undergraduate Research Technology Conference (URTC). IEEE, 2017: 1-4.Google ScholarGoogle Scholar
  35. Thandeeswaran R, Subhashini S, Jeyanthi N, Secured multi-cloud virtual infrastructure with improved performance [J]. Cybernetics and Information Technologies, 2012, 12(2): 11-22.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Brady Sullivan. Drupot [EB/OL]. 2020.6 [2022.8.31]. https://github.com/d1str0/drupot.Google ScholarGoogle Scholar
  37. Willem Mouton. OWA-honeypot [EB/OL]. 2019.6 [2022.8.31]. https://github.com/joda32/owa-honeypot/find/master.Google ScholarGoogle Scholar
  38. Karabulut B, Aydin M A, Zaim A H. An Application on Honeypot-Based Hybrid Deployment System: in the Turkish Software Industry [J]. BSEU Journal of Engineering Research and Technology, 2020, 1(1): 24-30.Google ScholarGoogle Scholar
  39. Wafi H, Fiade A, Hakiem N, Implementation of a modern security systems honeypot honey network on wireless networks [C]//2017 International Young Engineers Forum (YEF-ECE). IEEE, 2017: 91-96.Google ScholarGoogle Scholar
  40. Acosta J C, Basak A, Kiekintveld C, Lightweight On-demand Honeypot Deployment for Cyber Deception [C]//International Conference on Digital Forensics and Cyber Crime. Springer, Cham, 2022: 294-312.Google ScholarGoogle Scholar
  41. Candes E, Fan Y, Janson L, Panning for gold:‘model‐X'knockoffs for high dimensional controlled variable selection [J]. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 2018, 80(3): 551-577.sGoogle ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Honeypot Detection Method Based on Anomalous Requests Response Differences
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              ICECC '23: Proceedings of the 2023 6th International Conference on Electronics, Communications and Control Engineering
              March 2023
              316 pages
              ISBN:9798400700002
              DOI:10.1145/3592307

              Copyright © 2023 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 14 August 2023

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed limited
            • Article Metrics

              • Downloads (Last 12 months)49
              • Downloads (Last 6 weeks)8

              Other Metrics

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format