DocumentCode
518917
Title
Client honeypots: Approaches and challenges
Author
Qassrawi, Mahmoud T. ; Zhang, HongLi
Author_Institution
Sch. of Comput. Sci. & Technol., Harbin Inst. of Technol., Harbin, China
fYear
2010
fDate
11-13 May 2010
Firstpage
19
Lastpage
25
Abstract
In recent years, client user has become the main target for attacks, as the adversary believe that the end user is the weakest link in the security chain. Traditional honeypots and security tools are not effective against these new attacks. Therefore, client honeypot has appeared as new technology to supplement the existing protection tools. Client honeypot is a honeypot actively searches for malicious sites on the web. In this paper, we will show and analyze the main approaches used by client honeypots to detect client-side attacks. We will also address how attacker can evade and hide from client honeypots. Moreover, we discuss and analyze various issues relates to client honeypot: detection problems, invisibility of honeypots, and integrity issues. By analyzing characteristics of client honeypots, we will introduce factors to define and measure client honeypots effectiveness.
Keywords
Internet; invasive software; Web; client honeypots; client-side attacks; malicious sites; malware; protection tools; security chain; Computer crime; Computer science; Control systems; Electronic mail; Face detection; Intrusion detection; Protection; Streaming media; Target tracking; Web pages; 0day Attacks; Client Honeypots; Client-Side Attacks; False Negative; False Positve; Honeypots; Malwar; Obfuscation;
fLanguage
English
Publisher
ieee
Conference_Titel
New Trends in Information Science and Service Science (NISS), 2010 4th International Conference on
Conference_Location
Gyeongju
Print_ISBN
978-1-4244-6982-6
Electronic_ISBN
978-89-88678-17-6
Type
conf
Filename
5488508
Link To Document