Visible to the public Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior

TitlePicky Attackers: Quantifying the Role of System Properties on Intruder Behavior
Publication TypeConference Paper
Year of Publication2017
AuthorsBarron, Timothy, Nikiforakis, Nick
Conference NameProceedings of the 33rd Annual Computer Security Applications Conference
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5345-8
Keywordshoney pots, human factors, pubcrawl, resilience, Resiliency, Scalability
Abstract

Honeypots constitute an invaluable piece of technology that allows researchers and security practitioners to track the evolution of break-in techniques by attackers and discover new malicious IP addresses, hosts, and victims. Even though there has been a wealth of research where researchers deploy honeypots for a period of time and report on their findings, there is little work that attempts to understand how the underlying properties of a compromised system affect the actions of attackers. In this paper, we report on a four-month long study involving 102 medium-interaction honeypots where we vary a honeypot's location, difficulty of break-in, and population of files, observing how these differences elicit different behaviors from attackers. Moreover, we purposefully leak the credentials of dedicated, hard-to-brute-force, honeypots to hacking forums and paste-sites and monitor the actions of the incoming attackers. Among others, we find that, even though bots perform specific environment-agnostic actions, human attackers are affected by the underlying environment, e.g., executing more commands on honeypots with realistic files and folder structures. Based on our findings, we provide guidance for future honeypot deployments and motivate the need for having multiple intrusion-detection systems.

URLhttps://dl.acm.org/doi/10.1145/3134600.3134614
DOI10.1145/3134600.3134614
Citation Keybarron_picky_2017