Set-up and deployment of a high-interaction honeypot: experiment and lessons learned

  • Authors:
  • Vincent Nicomette;Mohamed Kaâniche;Eric Alata;Matthieu Herrb

  • Affiliations:
  • CNRS, LAAS, Toulouse, France 31077 and Université de Toulouse, UPS, INSA, INP, ISAE, LAAS, Toulouse, France 31077;CNRS, LAAS, Toulouse, France 31077 and Université de Toulouse, UPS, INSA, INP, ISAE, LAAS, Toulouse, France 31077;CNRS, LAAS, Toulouse, France 31077 and Université de Toulouse, UPS, INSA, INP, ISAE, LAAS, Toulouse, France 31077;CNRS, LAAS, Toulouse, France 31077 and Université de Toulouse, UPS, INSA, INP, ISAE, LAAS, Toulouse, France 31077

  • Venue:
  • Journal in Computer Virology
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents the lessons learned from an empirical analysis of attackers behaviours based on the deployment on the Internet of a high-interaction honeypot for more than 1 year. We focus in particular on the attacks performed via the SSH service and the activities performed by the attackers once they gain access to the system and try to progress in their intrusion. The first part of the paper describes: (a) the global architecture of the honeypot and the mechanisms used to capture the implementation details so that we can observe attackers behaviours and (b) the details of the experiment itself (duration, data captured, overview of the attackers activity). The second part presents the results of the observation of the attackers. It includes: (a) the description of the global attack process, constituted of two main steps, dictionary attacks and intrusions and (b) the detailed analysis of these two main steps.