loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: A. Boulaiche 1 and K. Adi 2

Affiliations: 1 ReSyd Doctoral School, University of Bejaia, Algeria ; 2 Computer Security Research Laboratory, University of Qubec in Outaou, Canada

Keyword(s): Security, Honeypot detection, Abnormal behaviours, ARP protocol.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Intrusion Detection & Prevention

Abstract: In this paper we describe some serious flaws in the software Honeyd that is one of the most popular software of honeypots, these flaws allow an attacker to easily identify the presence and the scope of a deployed honeypot. Hence, we describe in details both the flaws and how they can be used to attack the honeypot. Furthermore, we elaborate a set of possible solutions to fix each of these flaws. Our technique is mainly based on the detection of abnormal behaviors of the honeypot.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.135.213.214

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Boulaiche, A. and Adi, K. (2008). HONEYD DETECTION VIA ABNORMAL BEHAVIORS GENERATED BY THE ARPD DAEMON. In Proceedings of the International Conference on Security and Cryptography (ICETE 2008) - SECRYPT; ISBN 978-989-8111-59-3; ISSN 2184-3236, SciTePress, pages 65-71. DOI: 10.5220/0001927200650071

@conference{secrypt08,
author={A. Boulaiche. and K. Adi.},
title={HONEYD DETECTION VIA ABNORMAL BEHAVIORS GENERATED BY THE ARPD DAEMON},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2008) - SECRYPT},
year={2008},
pages={65-71},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001927200650071},
isbn={978-989-8111-59-3},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2008) - SECRYPT
TI - HONEYD DETECTION VIA ABNORMAL BEHAVIORS GENERATED BY THE ARPD DAEMON
SN - 978-989-8111-59-3
IS - 2184-3236
AU - Boulaiche, A.
AU - Adi, K.
PY - 2008
SP - 65
EP - 71
DO - 10.5220/0001927200650071
PB - SciTePress