Affiliation:
1. Department of Computer Science and Engineering, Indian Institute of Technology Kanpur, Kanpur, India
2. Department of Computer Science and Engineering, Indian Institute of Technology Kanpur, Kanpur India
Abstract
Honeypots serve as a valuable deception technology, enabling security teams to gain insights into the behaviour patterns of attackers and investigate cyber security breaches. However, traditional honeypots prove ineffective against advanced adversaries like Advanced Persistent Threats (APT) groups due to their evasion tactics and awareness of typical honeypot solutions. This article emphasises the need to capture these attackers for enhanced threat intelligence, detection, and protection. To address this, we propose the design and deployment of a customized honeypot network based on adaptive camouflaging techniques. Our work focuses on orchestrating a behavioral honeypot network tailored for three APT groups, with strategically positioned attack paths aligning with their tactics, techniques, and procedures, covering all cyber kill chain phases. We introduce a novel approach, deploying a camouflaged chatterbox application within the honeypot network. This application offers a regular chat interface while periodically tracking attacker activity by enabling periodic log transfers. Deployed for 100 days, our orchestrated honeypot recorded 13,906,945 hits from 4,238 unique IP addresses. Our approach categorizes attackers, discerning varying levels of sophistication, and identifies attacks from Hong Kong with similarities to known Chinese threat groups. This research significantly advances honeypot technology and enhances the understanding of sophisticated threat actors’ strategies in real operating networks.
Funder
C3i Hub, Indian Institute of Technology Kanpur, India
Publisher
Association for Computing Machinery (ACM)
Reference88 articles.
1. AbuseIpdB. 2023. AbuseIPDB. Retrieved January 15 2024 from https://www.abuseipdb.com/
2. A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities;Alshamrani Adel;IEEE Commun. Surv. Tutor.,2019
3. Alyssa Rahman. 2023. Cobalt Strike Analysis. Retrieved from https://www.mandiant.com/resources/blog/defining-cobalt-strike-components
4. P. Mohan Anand, P. V. Sai Charan, Hrushikesh Chunduri, and Sandeep K. Shukla. 2023. RTR-shield: Early detection of ransomware using registry and trap files. In International Conference on Information Security Practice and Experience. Springer, 209–229.
5. HiPeR-early detection of a ransomware attack using hardware performance counters;Anand P. Mohan;Digit. Threats: Res. Pract.,2023