Specification of a Model of Honeypot Attack Based On Raised Data
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33087
Specification of a Model of Honeypot Attack Based On Raised Data

Authors: Souleymane Oumtanaga, Prosper Kimou, Kouadio Gaza Kevin

Abstract:

The security of their network remains the priorities of almost all companies. Existing security systems have shown their limit; thus a new type of security systems was born: honeypots. Honeypots are defined as programs or intended servers which have to attract pirates to study theirs behaviours. It is in this context that the leurre.com project of gathering about twenty platforms was born. This article aims to specify a model of honeypots attack. Our model describes, on a given platform, the evolution of attacks according to theirs hours. Afterward, we show the most attacked services by the studies of attacks on the various ports. It is advisable to note that this article was elaborated within the framework of the research projects on honeyspots within the LABTIC (Laboratory of Information Technologies and Communication).

Keywords: Honeypot, networks, attack, leurrecom, computer network

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1081299

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1460

References:


[1] E. Alata, M Dacier ÔÇÿ-Leurré.com : retour d-expérience sur plusieurs mois d-utilisation d-un pot de miel distribué mondialement--.
[2] Home Page du projet Honeynet, http ://www.honeynet.org/, dernière visite 19 /09/2005.
[3] L. Spitzner, Honeypots: Tracking Hackers, Add.-Wesley, ISBN from-321-10895-7, 2002.
[4] French Honeynet Project, http: //honeynet.rstack.org.
[5] F. Pouget, T. Holz, _A Pointillist Approach for Comparing Honeypots_, Proc. Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2005), Vienne 9.
[6] ACI Sécurité et Informatique, http ://acisi.loria.fr.
[7] Fabien Pouget. Leurré.com, the Eurecom Honeypot Project introduction. http://www.eurecom.fr/~pouget/leurrecom.htm.
[8] NGUYEN Programme d-alerte base sur des pots de mile, septembre 2005.
[9] VMware Corporation Home Page, http: //www.vmware.com
[10] Honeyd Home page, http: //www.citi.umich.edu/u/provos/honeyd
[11] https://riviera.eurecom.fr/.
[12] fr.wikipedia.org/wiki/Loi_normale; last access sept 2006.
[13] Honeypot-Based Forensics F Pouget and M Dacier, Proceedings of the Asia Pacific Information Technology Security Conference, (Auscert), 2004.
[14] What-s port 445 used for in windows 2000/XP; www.petri.co.il
[15] Global Intrusion Detection: Prelude Hybrid IDS Mathieu Blanc1, Laurent Oudot1, and Vincent Glaume, rapport de recherche 2002.
[16] The Value of Honeypots, Part Two: Honeypot Solutions and Legal Issues by Lance Spitzner with extensive help from Marty Roesch last updated October 23, 2001.
[17] The value of Honeypots, Part one: Definitions and Values of Honeypots Lance Spitzner 2001-10-10.