Measuring the Effectiveness of Honeypot Counter-Counterdeception

  • Authors:
  • Neil C. Rowe

  • Affiliations:
  • U.S. Naval Postgraduate School

  • Venue:
  • HICSS '06 Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 06
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Honeypots are computer systems that try to fool cyberattackers into thinking they are ordinary computer systems, when in fact they are designed solely to collect data about attack methods and thereby enable better defense against attackers. Honeypots are more effective the more ordinary they appear, but so far designers have just used intuition in designing them. So it is valuable to develop metrics for measuring the effectiveness of honeypot deception. We report on several software tools we have developed for assessing the effectiveness of honeypots, particularly a metric-calculating tool that summarizes a file system by a vector of 72 numbers. Comparison of vectors between fake and real systems can guide design of the fake. We show that this metric tool, applied to a detailed fake file system we constructed, confirms that it is convincing in most ways.