skip to main content
10.1145/3136825.3136896acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

Practical challenges in building fake services with the record and play approach

Published:13 October 2017Publication History

ABSTRACT

One way to learn more about how a malicious program functions and what its objectives are is to deceive it with fake services that provide responses containing fabricated data. This goal can be achieved with so called record and play -honeypot that learns what the normal communication between clients and a server looks like and then tries to mimic it, but fabricates the contents of the responses so that they contain fake data. This paper outlines and presents the challenges faced in practical development of such honeypot. Some solutions and recommendations that mitigate the identified problems are also considered.

References

  1. M.H. Almeshekah and E.G. Spafford. 2014. Planning and Integrating Deception into Computer Security Defenses. In Proceedings of the 2014 workshop on New Security Paradigms Workshop. ACM, 127--138. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Bird, E. Klein, and E. Loper. 2009. Natural Language Processing with Python. O'Reilly Media. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. Caballero and D. Song. 2013. Automatic protocol reverse-engineering: Message format extraction and field semantics inference. Computer Networks: The International Journal of Computer and Telecommunications Networking archive 57, 2 (2013), 451--474. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. F. Cohen and D. Koike. 2004. Misleading attackers with deception. In Proceedings from the Fifth Annual IEEE Information Assurance Workshop. IEEE, 30--37.Google ScholarGoogle Scholar
  5. W. Cui, V. Paxson, N. Weaver, and R.H. Katz. 2006. Protocol-independent adaptive replay of application dialog. In Proceedings of the 13th Annual Network and Distributed System Security Symposium.Google ScholarGoogle Scholar
  6. D. Nadeau and S. Sekine. 2007. A survey of named entity recognition and classification. Lingvisticae Investigationes 30, 1 (2007), 3--26.Google ScholarGoogle ScholarCross RefCross Ref
  7. J. Papalitsas, S. Rauti, and V. Leppänen. 2017. A Comparison of Record and Play Honeypot Designs. Accepted for publication. (2017).Google ScholarGoogle Scholar
  8. S. Sekine and C. Nobata. 2004. Definition, Dictionaries and Tagger for Extended Named Entity Hierarchy. In LREC. 1977--1980.Google ScholarGoogle Scholar
  9. F. Shafique, K. Po, and A. Goel. 2006. Correlating Multi-session Attacks via Replay. In Proceedings of the 2nd Conference on Hot Topics in System Dependability - Volume 2 (HOTDEP'06). USENIX Association, 3--8. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Practical challenges in building fake services with the record and play approach

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        SIN '17: Proceedings of the 10th International Conference on Security of Information and Networks
        October 2017
        321 pages
        ISBN:9781450353038
        DOI:10.1145/3136825

        Copyright © 2017 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 October 2017

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper

        Acceptance Rates

        Overall Acceptance Rate102of289submissions,35%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader