Keywords

1 Introduction

Honeypot is the system to deceive the attacker by providing the decoy system which seems to be highly valuable, but badly secured so that the attacker can interact with that system. The administrator is able to analyze the attacker’s interaction with the system and categorize that attack by which the intent of the attackers can be known as discussed in [1, 2]. If a honeypot successfully interacts with the intruder, the intruder will never know that she/he is being monitored and tricked. Most of the honeypots are installed inside firewalls through which it can be controlled in a better way, although it can also be installed outside the firewalls. A firewall restricts the traffic coming from the Internet, whereas honeypot allows the traffic from the Internet, and restricts the traffic sent back from the system [1].

The parameters that are used to know the value fetched from a honeypot are given by [3]: (i) Type of deployment of honeypot and (ii) Scenario of deployment (location of deployment i.e. behind firewall inside DMZ, in front of firewall etc.). On the basis of these parameters a honeypot can act in the same way as bulgur alarm for detection of attacks, Prevention of attacks by deception and deterrence, responding to attacks by providing valuable logs regarding attack [3].

1.1 Areas of Deployment

There are two areas of deployment of honeypot: physical honeypots and virtual honeypots. In case of physical honeypots, the original system is allowed to completely compromise by the intruder. There is a risk to the system to be damaged by the intruder. So, another approach called as a virtual honeypot which provides the attacker with a vulnerable system which is not actually the real system is used, but the attacker never knows that he is dealing with the virtual system.

1.2 Types of Honeypot

There are two types of honeypot: High Interaction honeypot and Low Interaction honeypot. In a high-interaction honeypot the attacker can interact with a real system. While a low-interaction honeypots provides only some parts such as the network stack. The high interaction honeypot allows the adversary to fully compromise the system to launch the network attack. There is a higher risk in deploying high interaction honeypot. It takes more time for analyzing the events; it may take several days to know the intent of the attacker. It needs high maintenance so it is very hard to deploy. These are the drawbacks of high interaction honeypot.

Due to the drawbacks and risk in deployment of high-interaction honeypot, we have used the low interaction honeypot. Low-interaction honeypots are used to collect the statistical data and high-level information about attack patterns. Since an attacker interacts just with a simulation, he cannot fully compromise the system. A controlled environment is constructed by Low-interaction honeypots and thus the limited risk is involved: As the attacker cannot completely compromise the system, we do not need to worry about abuses of our low-interaction honeypots.

2 Related Work

The different types of honeypot can be used to detect different types attack by using different honeypot tools. Some previously known attacks and work done in honeypot is summarized as shown below (Table 1).

Table 1 Related works in honeypot

3 Objective

The objective of this paper is to learn the Probe attack patterns and generate rules for unknown probe attacks and update new rules into snort rule set. We not only trap the attacker but also try to know the motives and tactics used by the attacker.

4 Proposed Work

The honeypot is configured on the virtual system like Vmware. In low interaction honeypot, there are certain fingerprint files which contain the information about how the particular operating system will respond. For example, if we want to show the attacker that we are running Windows XP operating system, it will respond with certain characteristics, which will be used by the honeypot to respond to the attacker. The attacker will think that he is actually working with the Windows XP operating system but he will never know that he is actually dealing with the virtual operating system. The few of the important features of honeyd are creation, setting, binding and adding. In the creation process, we are going to create a template with some name or default. The structure of the template is as follows:

Figure 1 shows the working model of IDS and honeypot together. The intrusion detection system redirects the attacker to the honeypot, when the malicious activity is detected. The intruder interacts with the honeypot and tries to know its vulnerabilities and open ports. The honeypot allows to gain access to the limited resources of the system so that it should not make any harm to the important files and resources. The attack activities of the particular intruder is logged by the honeypot. This log file is then used to create new rules which are further added to the list of already generated rules. Once this is done, when the same type of behavior occurs next time, this is directly considered as attack and there is no need to redirect that intruder to the honeypot. In this way, the novel attacks can be detected by the intrusion detection system.

Fig. 1
figure 1

The working model of IDS and honeypot

5 Result and Discussion

We have studied the probe attack patterns and represented the number of instances of each type as follows (Table 2):

Table 2 Number of instances for each type of probe attack

We have estimated some snort rules by using honeypots and represented them in the form of pseudocode as follows:

If the attacker sends probe requests to multiple hosts using a specific port, then this attempt recorded as portsweep attack.

6 Conclusion

The primary objective of the honeypot is to collect intense attack patterns and decode it into human understandable format. In this paper, we have implemented a virtual honeypot using honeyd which is installed on Ubuntu 14 machine and the attack patterns are captured whenever recommended by the IDS. The well-known probe attacking tools are used for attacking the system by us. The packets captured by the honeypot is decoded and converted into csv format for subsequent analysis. Finally, the patterns are processed and the snort rule set is updated to detect these type of attacks that may take place in future. It helps the administrator to protect the system from probe attacks and to analyze the signatures of the attacks.