Title :
Measuring the Effectiveness of Honeypot Counter-Counterdeception
Author_Institution :
U.S. Naval Postgraduate School
Abstract :
Honeypots are computer systems that try to fool cyberattackers into thinking they are ordinary computer systems, when in fact they are designed solely to collect data about attack methods and thereby enable better defense against attackers. Honeypots are more effective the more ordinary they appear, but so far designers have just used intuition in designing them. So it is valuable to develop metrics for measuring the effectiveness of honeypot deception. We report on several software tools we have developed for assessing the effectiveness of honeypots, particularly a metric-calculating tool that summarizes a file system by a vector of 72 numbers. Comparison of vectors between fake and real systems can guide design of the fake. We show that this metric tool, applied to a detailed fake file system we constructed, confirms that it is convincing in most ways.
Keywords :
Access control; Computer networks; Computer worms; Computerized monitoring; Cryptography; File systems; Information security; Open source software; Packaging; Software tools;
Conference_Titel :
System Sciences, 2006. HICSS '06. Proceedings of the 39th Annual Hawaii International Conference on
Print_ISBN :
0-7695-2507-5
DOI :
10.1109/HICSS.2006.269