DocumentCode :
518917
Title :
Client honeypots: Approaches and challenges
Author :
Qassrawi, Mahmoud T. ; Zhang, HongLi
Author_Institution :
Sch. of Comput. Sci. & Technol., Harbin Inst. of Technol., Harbin, China
fYear :
2010
fDate :
11-13 May 2010
Firstpage :
19
Lastpage :
25
Abstract :
In recent years, client user has become the main target for attacks, as the adversary believe that the end user is the weakest link in the security chain. Traditional honeypots and security tools are not effective against these new attacks. Therefore, client honeypot has appeared as new technology to supplement the existing protection tools. Client honeypot is a honeypot actively searches for malicious sites on the web. In this paper, we will show and analyze the main approaches used by client honeypots to detect client-side attacks. We will also address how attacker can evade and hide from client honeypots. Moreover, we discuss and analyze various issues relates to client honeypot: detection problems, invisibility of honeypots, and integrity issues. By analyzing characteristics of client honeypots, we will introduce factors to define and measure client honeypots effectiveness.
Keywords :
Internet; invasive software; Web; client honeypots; client-side attacks; malicious sites; malware; protection tools; security chain; Computer crime; Computer science; Control systems; Electronic mail; Face detection; Intrusion detection; Protection; Streaming media; Target tracking; Web pages; 0day Attacks; Client Honeypots; Client-Side Attacks; False Negative; False Positve; Honeypots; Malwar; Obfuscation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
New Trends in Information Science and Service Science (NISS), 2010 4th International Conference on
Conference_Location :
Gyeongju
Print_ISBN :
978-1-4244-6982-6
Electronic_ISBN :
978-89-88678-17-6
Type :
conf
Filename :
5488508
Link To Document :
بازگشت