About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Digital Forensics and Cyber Crime. 12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings

Research Article

Lightweight On-Demand Honeypot Deployment for Cyber Deception

Download(Requires a free EAI acccount)
2 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-06365-7_18,
        author={Jaime C. Acosta and Anjon Basak and Christopher Kiekintveld and Charles Kamhoua},
        title={Lightweight On-Demand Honeypot Deployment for Cyber Deception},
        proceedings={Digital Forensics and Cyber Crime. 12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
        proceedings_a={ICDF2C},
        year={2022},
        month={6},
        keywords={Cybersecurity Network security Dynamic honeypots Experimentation Testbed},
        doi={10.1007/978-3-031-06365-7_18}
    }
    
  • Jaime C. Acosta
    Anjon Basak
    Christopher Kiekintveld
    Charles Kamhoua
    Year: 2022
    Lightweight On-Demand Honeypot Deployment for Cyber Deception
    ICDF2C
    Springer
    DOI: 10.1007/978-3-031-06365-7_18
Jaime C. Acosta,*, Anjon Basak1, Christopher Kiekintveld1, Charles Kamhoua
  • 1: Department of Computer Science
*Contact email: jaime.c.acosta.civ@army.mil

Abstract

Honeypots that are capable of deceiving attackers are an effective tool because they not only help protect networks and devices, but also because they collect information that can lead to the understanding of an attacker’s strategy and intent. Several trade-offs must be considered when employing honeypots. Systems and services in a honeypot must be relevant and attractive to an adversary and the computing and manpower costs must fit within the function and budget constraints of the system.

It is infeasible to instigate a single, static configuration to accommodate every type of system or target every possible adversary. The work we describe in this paper demonstrates a novel approach, introducing new capabilities to the Cyber Deception Experimentation System (CDES) to realize selective and on-demand honeypot instantiation. This allows honeypot resources to be introduced dynamically in response to detected adversarial actions. These honeypots consist of kernel namespaces and virtual machines that are invoked from an “at-rest” state. We provide a case study and analyze the performance of CDES when placed inline on a network. We also use CDES to start and subsequently redirect traffic to different honeynets dynamically. We show that these mechanisms can be used to swap with no noticeable delay. Additionally, we show that Nmap host-specific scans can be thwartedduring a real scan, so that probes are sent to a honey node instead of to the legitimate node.

Keywords
Cybersecurity Network security Dynamic honeypots Experimentation Testbed
Published
2022-06-04
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-06365-7_18
Copyright © 2021–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL