Honeycomb: creating intrusion detection signatures using honeypots

  • Authors:
  • Christian Kreibich;Jon Crowcroft

  • Affiliations:
  • University of Cambridge Computer Laboratory, Cambridge, United Kingdom;University of Cambridge Computer Laboratory, Cambridge, United Kingdom

  • Venue:
  • ACM SIGCOMM Computer Communication Review
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system applies pattern-matching techniques and protocol conformance checks on multiple levels in the protocol hierarchy to network traffic captured a honeypot system. We present results of running the system on an unprotected cable modem connection for 24 hours. The system successfully created precise traffic signatures that otherwise would have required the skills and time of a security officer to inspect the traffic manually.