Title :
True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots
Author :
Seifert, Christian ; Komisarczuk, Peter ; Welch, Ian
Author_Institution :
Sch. of Eng. & Comput. Sci., Victoria Univ. of Wellington, Wellington, New Zealand
Abstract :
Client honeypots are security devices designed to find servers that attack clients. High-interaction client honeypots (HICHPs) classify potentially malicious Web pages by driving a dedicated vulnerable Web browser to retrieve and classify these pages. Considering the size of the Internet, the ability to identify many malicious Web pages is a crucial task. HICHPs, however, present challenges: They are slow and tend to miss attacks. For researchers to address these shortcomings, they need methods for evaluating HICHPs. This paper (1) presents an evaluation method called the true positive cost curve (TPCC), which makes it possible to evaluate and compare HICHPs in an operating environment, but also allows an operator to tune HICHPs within a specific operating environment; (2) presents improvements on the way HICHPs visit Web pages and evaluates them with the TPCC method; and (3) discusses the impact of time bombs on the performance of HICHPs in an operating environment and the ability to tune an HICHP for optimal performance with the help of the TPCC.
Keywords :
Internet; Web sites; client-server systems; online front-ends; security of data; HICHP; Internet; classification; cost-based evaluation method; dedicated vulnerable Web browser; high-interaction client honeypot; potentially malicious Web page; security device; time bomb; true positive cost curve; Computer science; Computer security; Cost function; Design engineering; Information security; Internet; Intrusion detection; Weapons; Web pages; Web server; client honeypot; evaluation; intrusion detection; security;
Conference_Titel :
Emerging Security Information, Systems and Technologies, 2009. SECURWARE '09. Third International Conference on
Conference_Location :
Athens, Glyfada
Print_ISBN :
978-0-7695-3668-2
DOI :
10.1109/SECURWARE.2009.17