The nepenthes platform: an efficient approach to collect malware

  • Authors:
  • Paul Baecher;Markus Koetter;Thorsten Holz;Maximillian Dornseif;Felix Freiling

  • Affiliations:
  • Nepenthes Development Team;Nepenthes Development Team;Laboratory for Dependable Distributed Systems, University of Mannheim;Laboratory for Dependable Distributed Systems, University of Mannheim;Laboratory for Dependable Distributed Systems, University of Mannheim

  • Venue:
  • RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Up to now, there is little empirically backed quantitative and qualitative knowledge about self-replicating malware publicly available. This hampers research in these topics because many counter-strategies against malware, e.g., network- and host-based intrusion detection systems, need hard empirical data to take full effect. We present the nepenthes platform, a framework for large-scale collection of information on self-replicating malware in the wild. The basic principle of nepenthes is to emulate only the vulnerable parts of a service. This leads to an efficient and effective solution that offers many advantages compared to other honeypot-based solutions. Furthermore, nepenthes offers a flexible deployment solution, leading to even better scalability. Using the nepenthes platform we and several other organizations were able to greatly broaden the empirical basis of data available about self-replicating malware and provide thousands of samples of previously unknown malware to vendors of host-based IDS/anti-virus systems. This greatly improves the detection rate of this kind of threat.