DocumentCode :
1952230
Title :
OpenFire: Using deception to reduce network attacks
Author :
Borders, Kevin ; Falk, Laura ; Prakash, Atul
Author_Institution :
University of Michigan, EECS Department Ann Arbor, 48109, USA
fYear :
2007
fDate :
17-21 Sept. 2007
Firstpage :
224
Lastpage :
233
Abstract :
Remote network attacks are a serious problem facing network administrators today. OpenFire uses deception to interfere with the reconnaissance phase. Unlike traditional firewalls, instead of blocking unwanted traffic, it accepts all traffic, forwarding unwanted messages to a cluster of decoy machines. To the outside, all ports and all IP addresses appear open in an OpenFire network. OpenFire uses the honeypot concept in its design. However, unlike traditional honeypots, OpenFire attempts to present additional false targets by making it appear to an attacker that all ports, including unused ones, and all unused IP addresses of an organization are open, with the thesis that this will help divert attacks from real services to false services. In our experiments, we defined an attack to be snort’s priority 1 alert. During a 21-day evaluation period, we found that OpenFire reduced the number of attacks on real services by 65% as compared to an unprotected system and by 46% as compared to a Honeypot-protected system. We present OpenFire’s design, its performance, and defenses against some potential attacks.
Keywords :
Computer hacking; Computer security; Computer worms; Filling; IP networks; Probes; Protection; Reconnaissance; Storage area networks; Telecommunication traffic;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on
Conference_Location :
Nice, France
Print_ISBN :
978-1-4244-0974-7
Electronic_ISBN :
978-1-4244-0975-4
Type :
conf
DOI :
10.1109/SECCOM.2007.4550337
Filename :
4550337
Link To Document :
بازگشت