Ryandy Djap, Charles Lim, Kalpin Erlangga Silaen, Andi Yusuf
{"title":"XB-Pot: Revealing Honeypot-based Attacker’s Behaviors","authors":"Ryandy Djap, Charles Lim, Kalpin Erlangga Silaen, Andi Yusuf","doi":"10.1109/ICoICT52021.2021.9527422","DOIUrl":null,"url":null,"abstract":"Since its introduction, the honeypot has been used by researchers to track and learn the cyber attack into organization infrastructures. With the continuous rise of cyberattacks, deception technology, i.e., honeypot, has been eyed by organizations as a prominent tool to provide early detection of attack capability and defense mechanism after learning from the interaction between the attacker and the tool. In this research, a new enhanced framework is introduced to categorize attacker behaviors detected through our honeypots. The framework provides a finer-grained result allowing representation of the actual attacker behaviors as he/she interacts with the honeypot. Complete threat categories both on high-volume and low-volume attack traffic are presented.","PeriodicalId":191671,"journal":{"name":"2021 9th International Conference on Information and Communication Technology (ICoICT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 9th International Conference on Information and Communication Technology (ICoICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICoICT52021.2021.9527422","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
Since its introduction, the honeypot has been used by researchers to track and learn the cyber attack into organization infrastructures. With the continuous rise of cyberattacks, deception technology, i.e., honeypot, has been eyed by organizations as a prominent tool to provide early detection of attack capability and defense mechanism after learning from the interaction between the attacker and the tool. In this research, a new enhanced framework is introduced to categorize attacker behaviors detected through our honeypots. The framework provides a finer-grained result allowing representation of the actual attacker behaviors as he/she interacts with the honeypot. Complete threat categories both on high-volume and low-volume attack traffic are presented.