An Improved Honeypot Model for Attack Detection and Analysis

Marwan Abbas-Escribano, Hervé Debar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper presents a new model and design for honeypots, and the results obtained the implementation and exposure on the internet of an high interaction honeypot. We show that our model can allow higher interaction with attackers while preserving integrity and attractiveness. In our work, we use threat analysis based on the MITRE ATT&CK taxonomy to describe the design and supervision constraints of our honeypot with it's situation in our implemented architecture. We exposed our infrastructure during seventeen days and collected information about several actors and attack methods, from which we extracted previously undocumented Indicators of Compromise.

Original languageEnglish
Title of host publicationARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings
PublisherAssociation for Computing Machinery
ISBN (Electronic)9798400707728
DOIs
Publication statusPublished - 29 Aug 2023
Event18th International Conference on Availability, Reliability and Security, ARES 2023 - Benevento, Italy
Duration: 29 Aug 20231 Sept 2023

Publication series

NameACM International Conference Proceeding Series

Conference

Conference18th International Conference on Availability, Reliability and Security, ARES 2023
Country/TerritoryItaly
CityBenevento
Period29/08/231/09/23

Keywords

  • Honeypot Deception High Interaction Supervision Analysis Indicator of Compromise MITRE ATT&CK

Fingerprint

Dive into the research topics of 'An Improved Honeypot Model for Attack Detection and Analysis'. Together they form a unique fingerprint.

Cite this