2007 IEEE SMC Information Assurance and Security Workshop 2007
DOI: 10.1109/iaw.2007.381919
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Virtual Environments and Low Interaction Honeypots

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(15 citation statements)
references
References 4 publications
0
15
0
Order By: Relevance
“… Honeypot anti-detection Topic Author major honeypot detection techniques Holz [53], Mukkamala [54] hijacking honeypots after their detections Dornseif [52] study of Honeypot Hunter McCarty [53] detection using bots Wang [56], Zou [58] denial of service to honeypots Yegneswaran [57] polymorphic worms to honeypots Perdisci [55] Table 4 -Summaries of Section V Section VI discusess the legal and ethical issues involved with honeypots and the data they collect. Although the number of papers published on these issues is still relatively small compared to the other issues in this survey, we considered the issues worth a section because of their importance.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“… Honeypot anti-detection Topic Author major honeypot detection techniques Holz [53], Mukkamala [54] hijacking honeypots after their detections Dornseif [52] study of Honeypot Hunter McCarty [53] detection using bots Wang [56], Zou [58] denial of service to honeypots Yegneswaran [57] polymorphic worms to honeypots Perdisci [55] Table 4 -Summaries of Section V Section VI discusess the legal and ethical issues involved with honeypots and the data they collect. Although the number of papers published on these issues is still relatively small compared to the other issues in this survey, we considered the issues worth a section because of their importance.…”
Section: Discussionmentioning
confidence: 99%
“…Mukkamala studied detection techniques for lowinteraction honeypots and honeypots running in virtula machines, which are basis for many high-interaction honeypots, by perfogming timing analysis, analyses on avilable server services, and TCP/IP fingerprinintg [54]. Timing analysis measured the response time from a server and detceted honeypots by slower response from honeypots than real production servers.…”
Section: Honeypot Anti-detectionsmentioning
confidence: 99%
“…(3) ICMP_ECHO_response_time. Mukkamala et al [19] claim that it is common to run several virtual honeypots on a single machine. So, when handling ICMP ECHO request, honeypots are always slower than real systems.…”
Section: Network-layer Featurementioning
confidence: 99%
“…e main problem is that the simulation of high-interaction honeypots is too similar to real systems, making it difficult to detect with a single feature. erefore, other researchers start to extract other features and introduce the latest algorithms [17][18][19]. But there are still many shortcomings; at present, this paper explores honeypot detection technology to improve the effectiveness of deception technologies, which is helpful to promote the current development of honeypot technology.…”
Section: Introductionmentioning
confidence: 99%
“…Systems with a more realistic imitation tend to be more complex to monitor and secure as there is a wider variety of possible actions. There is an abundance of examples, where systems that provide full-fledged operating systems are suffering from easy detection, relay attacks and monitoring circumvention [49][50][51][52][53]. To mitigate detection attempts, it is of significant importance to enable a dynamic configuration, deployment and management of such systems [54,55].…”
Section: Honeypotsmentioning
confidence: 99%