2019 IEEE 9th International Conference on Advanced Computing (IACC) 2019
DOI: 10.1109/iacc48062.2019.8971584
|View full text |Cite
|
Sign up to set email alerts
|

Multi Platform Honeypot for Generation of Cyber Threat Intelligence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 4 publications
0
6
0
1
Order By: Relevance
“…Qualitative and supply issues will be mitigated, as well as bias and actor naming issues, when the CTI field improves its approach. The authors present the honey trap base as a low-level interaction honeypot for effective detection and enhanced security controls [4]. A persistent threat actor in West Asia is using Microsoft OneDrive for command-and-control (C2) purposes.…”
Section: Related Workmentioning
confidence: 99%
“…Qualitative and supply issues will be mitigated, as well as bias and actor naming issues, when the CTI field improves its approach. The authors present the honey trap base as a low-level interaction honeypot for effective detection and enhanced security controls [4]. A persistent threat actor in West Asia is using Microsoft OneDrive for command-and-control (C2) purposes.…”
Section: Related Workmentioning
confidence: 99%
“…They are considered a valuable source for gathering information regarding the tactics and techniques, as well as the attack patterns used against the exposed services, thus providing useful and actionable CTI. Additionally, honeypots are utilised in conjunction with other security components (e.g., IDS and Security Information and Event Management (SIEM) systems) in order to improve and enhance their detection performance [2], [3]. For their deployment, the majority of approaches utilise docker containers; low and medium-interaction honeypots are preferred, with Dionaea 1 and Cowrie 2 being the most popular ones [2]- [5].…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, honeypots are utilised in conjunction with other security components (e.g., IDS and Security Information and Event Management (SIEM) systems) in order to improve and enhance their detection performance [2], [3]. For their deployment, the majority of approaches utilise docker containers; low and medium-interaction honeypots are preferred, with Dionaea 1 and Cowrie 2 being the most popular ones [2]- [5].…”
Section: Related Workmentioning
confidence: 99%
“…To gather data, we utilise a honeypot implementation. Honeypots can mimic the behaviour (e.g., the services) of a typical system and therefore, in the view of attackers, honeypots are just another endpoint that can be attacked; however, honeypots are not actual systems and can lure attackers into performing malicious actions [16]. After extensive research, we decided to use the Dionaea honeypot deployed on a cloud VM located on the AWS platform.…”
Section: A Data Collectionmentioning
confidence: 99%