
Research Article
Lightweight On-Demand Honeypot Deployment for Cyber Deception
@INPROCEEDINGS{10.1007/978-3-031-06365-7_18, author={Jaime C. Acosta and Anjon Basak and Christopher Kiekintveld and Charles Kamhoua}, title={Lightweight On-Demand Honeypot Deployment for Cyber Deception}, proceedings={Digital Forensics and Cyber Crime. 12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, proceedings_a={ICDF2C}, year={2022}, month={6}, keywords={Cybersecurity Network security Dynamic honeypots Experimentation Testbed}, doi={10.1007/978-3-031-06365-7_18} }
- Jaime C. Acosta
Anjon Basak
Christopher Kiekintveld
Charles Kamhoua
Year: 2022
Lightweight On-Demand Honeypot Deployment for Cyber Deception
ICDF2C
Springer
DOI: 10.1007/978-3-031-06365-7_18
Abstract
Honeypots that are capable of deceiving attackers are an effective tool because they not only help protect networks and devices, but also because they collect information that can lead to the understanding of an attacker’s strategy and intent. Several trade-offs must be considered when employing honeypots. Systems and services in a honeypot must be relevant and attractive to an adversary and the computing and manpower costs must fit within the function and budget constraints of the system.
It is infeasible to instigate a single, static configuration to accommodate every type of system or target every possible adversary. The work we describe in this paper demonstrates a novel approach, introducing new capabilities to the Cyber Deception Experimentation System (CDES) to realize selective and on-demand honeypot instantiation. This allows honeypot resources to be introduced dynamically in response to detected adversarial actions. These honeypots consist of kernel namespaces and virtual machines that are invoked from an “at-rest” state. We provide a case study and analyze the performance of CDES when placed inline on a network. We also use CDES to start and subsequently redirect traffic to different honeynets dynamically. We show that these mechanisms can be used to swap with no noticeable delay. Additionally, we show that Nmap host-specific scans can be thwartedduring a real scan, so that probes are sent to a honey node instead of to the legitimate node.