Author :
Raynal, Frédéric ; Berthier, Yann ; Biondi, Philippe ; Kaminsky, Danielle
Abstract :
A major goal of honeypot research is to improve our knowledge of blackhats from two perspectives: technical and ethnological. For the former we want new ways to discover rootkits, Trojans, and potential zero-day exploits. For the latter, we want a better understanding of the areas of interest and hidden links between blackhat teams. One way to achieve these goals is to increase the verbosity of our honeypot logs and traces so that we learn every single action the intruder made. The most common tools for doing this are Sebek for system events and Snort for network activity. Unfortunately, there is no easy way to correlate information from these sources, which complicates honeypot forensics. Although computer forensics focuses on analyzing a system once we suspect it has been compromised, we expect honeypots to be compromised. Thus, honeypot forensics focuses on understanding the blackhat´s techniques and tools, before and after its intrusion on the honeypot. The article looks at: network activity analysis; building the network timeline; and tools and techniques.
Keywords :
computer crime; computer network management; Trojans; blackhats; honeypot forensics; network activity analysis; network flows; network timeline; potential zero-day exploits; rootkits; Computer security; Data privacy; Data security; Forensics; Gears; Passive networks; Protocols; TCPIP; Telecommunication traffic; Web server; 65; blackhat; honeynets; honeypots;