Emulating a High Interaction Honeypot to Monitor Intrusion Activity

1Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Intrusion activity monitoring is a complex task to achieve. An intruder should not be alerted about being monitored. A stealthy approach is needed, that does not alert the intruder about the presence of monitoring. Virtual Machine based High Interaction Honeypots help achieve stealthy monitoring. Most of the related research work use the concept of Virtual Machine Introspection that relies on System Call Interception. However most of these methods hook the sysenter instruction for interception of system calls. This can be defeated by an intruder since this is not the only way of making a system call. We have designed and implemented a High-Interaction Virtual Machine based honeypot using the open source tool Qebek. Qebek is more effective as it hooks the actual system call implementation itself. We have tested its capturability by running different types of malware. The Results obtained show that the system is able to capture information about processes running on the honeypot, console data and network activities, which reveal the maliciousness of the activities. © Springer-Verlag Berlin Heidelberg 2013.

Cite

CITATION STYLE

APA

Gopalakrishna, A., & Pais, A. R. (2013). Emulating a High Interaction Honeypot to Monitor Intrusion Activity. In Communications in Computer and Information Science (Vol. 377 CCIS, pp. 70–76). Springer Verlag. https://doi.org/10.1007/978-3-642-40576-1_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free