2021
DOI: 10.48550/arxiv.2109.10652
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Gotta catch 'em all: a Multistage Framework for honeypot fingerprinting

Abstract: Honeypots are decoy systems that lure attackers by presenting them with a seemingly vulnerable system. They provide an early detection mechanism as well as a method for learning how adversaries work and think. However, over the last years a number of researchers have shown methods for fingerprinting honeypots. This significantly decreases the value of a honeypot; if an attacker is able to recognize the existence of such a system, they can evade it. In this article, we revisit the honeypot identification field,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…In another work by Srinivasa et al, a framework for fingerprinting different honeypots is proposed. The utilized techniques include so-called probe-based fingerprinting (such as port-scans or banner-checks), and metascan-based fingerprinting (e.g., using data from the Shodan API) [22].…”
Section: Honeypot Fingerprintingmentioning
confidence: 99%
See 1 more Smart Citation
“…In another work by Srinivasa et al, a framework for fingerprinting different honeypots is proposed. The utilized techniques include so-called probe-based fingerprinting (such as port-scans or banner-checks), and metascan-based fingerprinting (e.g., using data from the Shodan API) [22].…”
Section: Honeypot Fingerprintingmentioning
confidence: 99%
“…As the name implies, interaction refers to how much capabilities are offered to the adversary. The process of discovering the existence of a honeypot in a system is known as honeypot fingerprinting [26,22]. The drawback of many honeypots is that their emulation of systems/protocols exposes some artifacts that attackers can detect.…”
Section: Introductionmentioning
confidence: 99%