Visible to the public Analysis of Attack and Attackers on VoIP Honeypot Environment

TitleAnalysis of Attack and Attackers on VoIP Honeypot Environment
Publication TypeConference Paper
Year of Publication2018
AuthorsKılın\c c, H. H., Acar, O. F.
Conference Name2018 26th Signal Processing and Communications Applications Conference (SIU)
Date Publishedmay
ISBN Number978-1-5386-1501-0
Keywordsattacker profiles, Conferences, Dogs, honey pots, honeypots, Human Behavior, human factors, Internet telephony, IP networks, low interaction honeypot environment, privacy, Protocols, pubcrawl, Reactive power, resilience, Resiliency, Scalability, security, Security Tests, SIP, telecommunication security, VoIP, VoIP Honeypot environment, VoIP-based Honeypot, vulnerability exploitation
Abstract

This work explores attack and attacker profiles using a VoIP-based Honeypot. We implemented a low interaction honeypot environment to identify the behaviors of the attackers and the services most frequently used. We watched honeypot for 180 days and collected 242.812 events related to FTP, SIP, MSSQL, MySQL, SSH, SMB protocols. The results provide an in-depth analysis about both attacks and attackers profile, their tactics and purposes. It also allows understanding user interaction with a vulnerable honeypot environment.

URLhttps://ieeexplore.ieee.org/document/8404331
DOI10.1109/SIU.2018.8404331
Citation Keykilinc_analysis_2018