作者
Shun Morishita, Takuya Hoizumi, Wataru Ueno, Rui Tanabe, Carlos Gañán, Michel JG Van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto
发表日期
2019/4/8
研讨会论文
2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)
页码范围
134-143
出版商
IEEE
简介
Open-source honeypots are a vital component in the protection of networks and the observation of trends in the threat landscape. Their open nature also enables adversaries to identify the characteristics of these honeypots in order to detect and avoid them. In this study, we investigate the prevalence of 14 open- source honeypots running more or less default configurations, making them easily detectable by attackers. We deploy 20 simple signatures and test them for false positives against servers for domains in the Alexa top 10,000, official FTP mirrors, mail servers in real operation, and real IoT devices running telnet. We find no matches, suggesting good accuracy. We then measure the Internet-wide prevalence of default open-source honeypots by matching the signatures with Censys scan data and our own scans. We discovered 19,208 honeypots across 637 Autonomous Systems that are trivially easy to identify …
引用总数
20192020202120222023202433813112
学术搜索中的文章
S Morishita, T Hoizumi, W Ueno, R Tanabe, C Gañán… - 2019 IFIP/IEEE Symposium on Integrated Network and …, 2019