The DecoyPort: redirecting hackers to honeypots

  • Authors:
  • Iksu Kim;Myungho Kim

  • Affiliations:
  • School of Computing, Soongsil University, Seoul, South Korea;School of Computing, Soongsil University, Seoul, South Korea

  • Venue:
  • NBiS'07 Proceedings of the 1st international conference on Network-based information systems
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Most of computer security systems use the signatures of well-known attacks to detect hackers' attacks. For these systems, it is very important to get the accurate signatures of new attacks as soon as possible. For this reason, there have been several researches on honeypots. However, honeypots can not collect information about hackers attacking active computers except themselves. In this paper, we propose the DecoyPort system to redirect hackers toward honeypots. The DecoyPort system creates the DecoyPorts on active computers. All interactions with the DecoyPorts are considered as suspect because the ports are not those for real services. Accordingly, every request sent to the DecoyPorts is redirected to honeypots by the DecoyPort system. Consequently, our system enables honeypots to collect information about hackers attacking active computers except themselves.