Title | Modeling Malware-driven Honeypots |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | G. Fernandez, A. Nieto, and J. Lopez |
Conference Name | 14th International Conference On Trust, Privacy & Security In Digital Business (TrustBus 2017) |
Volume | 10442 |
Pagination | 130-144 |
Date Published | 08/2017 |
Publisher | Springer International Publishing |
Conference Location | Lyon (France) |
ISBN Number | 978-3-319-64482-0 |
Keywords | adaptive, dynamic, Honeypot, intelligence, IOC, malware |
Abstract | In this paper we propose the Hogney architecture for the deployment of malware-driven honeypots. This new concept refers to honeypots that have been dynamically configured according to the environment expected by malware. The adaptation mechanism designed here is built on services that offer up-to-date and relevant intelligence information on current threats. Thus, the Hogney architecture takes advantage of recent Indicators Of Compromise (IOC) and information about suspicious activity currently being studied by analysts. The information gathered from these services is then used to adapt honeypots to fulfill malware requirements, inviting them to unleash their full strength. |
URL | https://link.springer.com/chapter/10.1007/978-3-319-64483-7_9 |
DOI | 10.1007/978-3-319-64483-7_9 |
Citation Key | 1656 |
Modeling Malware-driven Honeypots
Paper File:
https://nics.uma.es:8082/sites/default/files/papers/1656.pdf