A honeypot proxy framework for deceiving attackers with fabricated content

5Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Deception is a promising method for strengthening software security. It differs from many traditional security approaches as it does not directly prevent the attacker’s actions but instead aims to learn about the attacker’s behavior. In this paper, we discuss the idea of deceiving attackers with fake services and fabricated content in order to find out more about malware’s functionality and to hamper cyber intelligence. The effects of false data on the malware’s behavior can be studied while at the same time complicating cyber intelligence by feeding fallacious content to the adversary. We also discuss the properties required from a tool generating fabricated entities. We then introduce a design for a honeypot proxy that generates fallacious content for fake services in order to deceive attackers, and test our implementation’s accuracy and performance. We conclude that although challenging in many ways, deceiving adversaries with fake services is a promising and feasible approach in order to protect computer systems and analyze malware.

Cite

CITATION STYLE

APA

Papalitsas, J., Rauti, S., Tammi, J., & Leppänen, V. (2018). A honeypot proxy framework for deceiving attackers with fabricated content. In Advances in Information Security (Vol. 70, pp. 239–258). Springer New York LLC. https://doi.org/10.1007/978-3-319-73951-9_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free