Hyuga Kobayashi, Zhiqing Zhang, H. Ochiai, H. Esaki
{"title":"利用蜜罐探测恶意软件感染网络的防火墙","authors":"Hyuga Kobayashi, Zhiqing Zhang, H. Ochiai, H. Esaki","doi":"10.1145/3341188.3341190","DOIUrl":null,"url":null,"abstract":"Today, regardless of firewalls deployed at the gateway of the local area networks (LAN), the hosts inside the LAN are frequently got infected by malware. Firewall should be the basic protection scheme, but the effectiveness of firewalls has been recently questioned. We propose a federation scheme of Firewall Probe and Honeypot for investigating the firewall type of malware-infected networks. By capturing network scan made on the Internet by honeypot, we can find the malicious source, and we deploy our firewall probe targeting to the source and categorize the network type into Type A (safe) ... Type E (alert). We investigated firewalls remotely in this way for both randomly-selected networks in global and malware-infected networks. The experiment results indicate that about 91.9% of malware-infected networks does not have even basic firewalls, but left of the networks -- 8.1% were well-protected regarding their firewall. Even those well-protected networks certainly made malicious Internet scanning from behind their firewalls.","PeriodicalId":237715,"journal":{"name":"Proceedings of the 14th International Conference on Future Internet Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Probing Firewalls of Malware-Infected Networks with Honeypot\",\"authors\":\"Hyuga Kobayashi, Zhiqing Zhang, H. Ochiai, H. Esaki\",\"doi\":\"10.1145/3341188.3341190\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today, regardless of firewalls deployed at the gateway of the local area networks (LAN), the hosts inside the LAN are frequently got infected by malware. Firewall should be the basic protection scheme, but the effectiveness of firewalls has been recently questioned. We propose a federation scheme of Firewall Probe and Honeypot for investigating the firewall type of malware-infected networks. By capturing network scan made on the Internet by honeypot, we can find the malicious source, and we deploy our firewall probe targeting to the source and categorize the network type into Type A (safe) ... Type E (alert). We investigated firewalls remotely in this way for both randomly-selected networks in global and malware-infected networks. The experiment results indicate that about 91.9% of malware-infected networks does not have even basic firewalls, but left of the networks -- 8.1% were well-protected regarding their firewall. Even those well-protected networks certainly made malicious Internet scanning from behind their firewalls.\",\"PeriodicalId\":237715,\"journal\":{\"name\":\"Proceedings of the 14th International Conference on Future Internet Technologies\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-08-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 14th International Conference on Future Internet Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3341188.3341190\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 14th International Conference on Future Internet Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3341188.3341190","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Probing Firewalls of Malware-Infected Networks with Honeypot
Today, regardless of firewalls deployed at the gateway of the local area networks (LAN), the hosts inside the LAN are frequently got infected by malware. Firewall should be the basic protection scheme, but the effectiveness of firewalls has been recently questioned. We propose a federation scheme of Firewall Probe and Honeypot for investigating the firewall type of malware-infected networks. By capturing network scan made on the Internet by honeypot, we can find the malicious source, and we deploy our firewall probe targeting to the source and categorize the network type into Type A (safe) ... Type E (alert). We investigated firewalls remotely in this way for both randomly-selected networks in global and malware-infected networks. The experiment results indicate that about 91.9% of malware-infected networks does not have even basic firewalls, but left of the networks -- 8.1% were well-protected regarding their firewall. Even those well-protected networks certainly made malicious Internet scanning from behind their firewalls.