A Qualitative Empirical Analysis of Human Post-Exploitation Behavior

01/06/2021
by   Daniel Schneider, et al.
0

Honeypots are a well-studied defensive measure in network security. This work proposes an effective low-cost honeypot that is easy to deploy and maintain. The honeypot introduced in this work is able to handle commands in a non-standard way by blocking them or replying with an insult to the attacker. To determine the most efficient defense strategy, the interaction between attacker and defender is modeled as a Bayesian two-player game. For the empirical analysis, three honeypot instances were deployed, each with a slight variation in its configuration. In total, over 200 distinct sessions were captured, which allows for qualitative evaluation of post-exploitation behavior. The findings show that attackers react to insults and blocked commands in different ways, ranging from ignoring to sending insults themselves. The main contribution of this work lies in the proposed framework, which offers a low-cost alternative to more technically sophisticated and resource-intensive approaches.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/25/2023

Evaluating Deception and Moving Target Defense with Network Attack Simulation

In the field of network security, with the ongoing arms race between att...
research
03/01/2023

Planning for Attacker Entrapment in Adversarial Settings

In this paper, we propose a planning framework to generate a defense str...
research
08/02/2022

A Model for Perimeter-Defense Problems with Heterogeneous Teams

We develop a model of the multi-agent perimeter-defense game to calculat...
research
06/27/2022

Measuring and Clustering Network Attackers using Medium-Interaction Honeypots

Network honeypots are often used by information security teams to measur...
research
02/23/2016

Moving Target Defense for Web Applications using Bayesian Stackelberg Games

The present complexity in designing web applications makes software secu...
research
04/18/2020

Protecting Classifiers From Attacks. A Bayesian Approach

Classification problems in security settings are usually modeled as conf...
research
06/08/2021

Analysis of Attacker Behavior in Compromised Hosts During Command and Control

Traditional reactive approach of blacklisting botnets fails to adapt to ...

Please sign up or login with your details

Forgot password? Click here to reset