Faculty of Information Technology, BUT

Publication Details

Behavioral signature generation using shadow honeypot

BARABAS Maroš, DROZD Michal and HANÁČEK Petr. Behavioral signature generation using shadow honeypot. World Academy of Science, Engineering and Technology, vol. 2012, no. 65, pp. 829-833. ISSN 2010-376X. Available from: http://www.waset.org/journals/waset/v65/v65-163.pdf
Czech title
Generace signatur chování použitím shadow honeypotu
Type
journal article
Language
english
Authors
URL
Keywords
behavioral signatures, metrics, network, security design
Abstract
The main goal is to present new method of detection zero-day buffer overflow vulnerabilities. This method is based on signature generation from network traffic. We provide the detection model that generates detection profiles by honeypot systems. In this article we show 112 metrics that will be used for malware characterization in network traffic and we show the use of this method on two examples: abused buffer overflow vulnerability in FTP server and use of public known internet worm - Conficker.
Annotation
A novel behavioral detection framework is proposed to detect zero day buffer overflow vulnerabilities (based on network behavioral signatures) using zero-day exploits, instead of the signature-based or anomaly-based detection solutions currently available for IDPS techniques. At first we present the detection model that uses shadow honeypot. Our system is used for the online processing of network attacks and generating a behavior detection profile. The detection profile represents the dataset of 112 types of metrics describing the exact behavior of malware in the network. In this paper we present the examples of generating behavioral signatures for two attacks - a buffer overflow exploit on FTP server and well known Conficker worm. We demonstrated the visualization of important aspects by showing the differences between valid behavior and the attacks. Based on these metrics we can detect attacks with a very high probability of success, the process of detection is, however, very expensive.
Published
2012
Pages
829-833
Journal
World Academy of Science, Engineering and Technology, vol. 2012, no. 65, ISSN 2010-376X
Publisher
World Academy Science Engineering Technology
BibTeX
@ARTICLE{FITPUB9852,
   author = "Maro\v{s} Barabas and Michal Drozd and Petr Han\'{a}\v{c}ek",
   title = "Behavioral signature generation using shadow honeypot",
   pages = "829--833",
   journal = "World Academy of Science, Engineering and Technology",
   volume = 2012,
   number = 65,
   year = 2012,
   ISSN = "2010-376X",
   language = "english",
   url = "https://www.fit.vut.cz/research/publication/9852"
}
Back to top