【24h】

Caught In the Honeypot: An Analysis of Computer Attacker Trends

机译:陷入蜜罐:计算机攻击者趋势分析

获取原文
获取原文并翻译 | 示例

摘要

A honeypot is a computing resource whose only value lies in actually being attacked so as to capture data on hackers. These systems are quickly catching on as a good way to compliment existing security architectures. While research honeypots are intended to capture hacker techniques and motives, production honeypots are mainly used for detection. Specter, one such production honeypot, has a low level of interaction capability from an attacker's viewpoint and captures only a small amount of data detailing an attack, but it provides enough data to allow for trend analysis concerning attack volume, attack frequency, the source of attack, types of attack, and when attacks are most likely to occur. Specter also helps in investigating if the attacks are by humans, scripts, or worms. This information can be helpful for security professionals in the hardening of their networks and systems. This paper first describes honeypots in general and how they are being used. It then details Specter and how it was deployed during a research project, reviews attack trends from the last half of 2002, and reports results based on a short 2-week research period. These results are compared to the previous work's data, and possible reasons into any discrepancies are provided.
机译:蜜罐是一种计算资源,其唯一价值在于实际受到攻击以捕获黑客数据。这些系统正在迅速流行,是补充现有安全体系结构的好方法。研究型蜜罐旨在捕获黑客的技术和动机,而生产型蜜罐则主要用于检测。从生产者的角度来看,Spectre是一种生产蜜罐,它的交互能力很低,并且仅捕获少量详细描述了攻击的数据,但是它提供了足够的数据来进行有关攻击量,攻击频率,攻击来源的趋势分析。攻击,攻击类型以及最有可能发生攻击的时间。 Spectre还有助于调查攻击是由人,脚本还是蠕虫引起的。此信息对于安全专业人员的网络和系统加固可能会有所帮助。本文首先介绍了蜜罐的一般情况以及如何使用它们。然后,它详细介绍了Spectre及其在研究项目中的部署方式,回顾了2002年下半年以来的攻击趋势,并基于短短的2周研究期报告了结果。将这些结果与以前的工作数据进行比较,并提供可能导致差异的原因。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号