Network honeypots are often used by information security teams to measure the threat landscape in order to secure their networks. With the advancement of honeypot development, today's medium-interaction honeypots provide a way for security teams and researchers to deploy these active defense tools that require little maintenance on a variety of protocols. In this work, we deploy such honeypots on five different protocols on the public Internet and study the intent and sophistication of the attacks we observe. We then use the information gained to develop a clustering approach that identifies correlations in attacker behavior to discover IPs that are highly likely to be controlled by a single operator, illustrating the advantage of using these honeypots for data collection.
翻译:信息安全小组经常使用网络蜂蜜罐来测量威胁环境以保障其网络安全。随着蜂蜜罐开发的推进,今天的中等互动蜂蜜罐为安全小组和研究人员提供了一种途径,以部署这些在各种协议上几乎不需要维护的积极防御工具。在这项工作中,我们在公共互联网上根据五种不同的协议部署蜂蜜罐,并研究我们观察到的袭击的意图和复杂程度。然后,我们利用获得的信息开发一种集群方法,确定攻击者行为的相关性,以发现极有可能由单一操作者控制的IP,说明利用这些蜂蜜罐收集数据的好处。