Analysis of Attack and Attackers on VoIP Honeypot Environment
Title | Analysis of Attack and Attackers on VoIP Honeypot Environment |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Kılın\c c, H. H., Acar, O. F. |
Conference Name | 2018 26th Signal Processing and Communications Applications Conference (SIU) |
Date Published | may |
ISBN Number | 978-1-5386-1501-0 |
Keywords | attacker profiles, Conferences, Dogs, honey pots, honeypots, Human Behavior, human factors, Internet telephony, IP networks, low interaction honeypot environment, privacy, Protocols, pubcrawl, Reactive power, resilience, Resiliency, Scalability, security, Security Tests, SIP, telecommunication security, VoIP, VoIP Honeypot environment, VoIP-based Honeypot, vulnerability exploitation |
Abstract | This work explores attack and attacker profiles using a VoIP-based Honeypot. We implemented a low interaction honeypot environment to identify the behaviors of the attackers and the services most frequently used. We watched honeypot for 180 days and collected 242.812 events related to FTP, SIP, MSSQL, MySQL, SSH, SMB protocols. The results provide an in-depth analysis about both attacks and attackers profile, their tactics and purposes. It also allows understanding user interaction with a vulnerable honeypot environment. |
URL | https://ieeexplore.ieee.org/document/8404331 |
DOI | 10.1109/SIU.2018.8404331 |
Citation Key | kilinc_analysis_2018 |
- pubcrawl
- vulnerability exploitation
- VoIP-based Honeypot
- VoIP Honeypot environment
- VoIP
- telecommunication security
- SIP
- Security Tests
- security
- Scalability
- Resiliency
- resilience
- Reactive power
- attacker profiles
- Protocols
- privacy
- low interaction honeypot environment
- IP networks
- Internet telephony
- Human Factors
- Human behavior
- honeypots
- honey pots
- Dogs
- Conferences