• DocumentCode
    884879
  • Title

    Anti-honeypot technology

  • Author

    Krawetz, Neal

  • Volume
    2
  • Issue
    1
  • fYear
    2004
  • Firstpage
    76
  • Lastpage
    79
  • Abstract
    Spammers continually scan the Internet for open proxy relays: by using these open relays, they can obscure their originating IP address and remain anonymous. However, when a spammer comes across a service on a honeypot, that honeypot can collect valuable information about the spammer\´s true identity and help unmask it. In response to the threat that honeypots pose to spammers, the first commercial anti-honeypot technology has surfaced: Send-Safe\´s Honeypot Hunter (www.send-safe. com) attempts to detect "safe" proxies for use with bulk-mailing tools. This honeypot-detection system\´s appearance, in association with other emerging spam tools, suggests three important trends: honeypots are affecting spammers, current honeypot technology is detectable, and more honeypot-identification systems are likely. The ability to detect a honeypot is unlikely to remain limited to spammers; other hostile or malicious groups could benefit from similar identification systems. In an effort to create undetectable honeypot systems, we need a significant improvement in today\´s honeypot technologies.
  • Keywords
    Internet; authorisation; unsolicited e-mail; Honeypot Hunter; Internet; Send-Safe; bulk-mailing tools; commercial anti-honeypot technology; honeypot-detection system; honeypot-identification systems; malicious groups; open proxy relays; originating IP address; safe proxies; spammers; Bayesian methods; Computer security; Counting circuits; Electronic mail; Encoding; Internet; Joining processes; Privacy; Relays; Testing;
  • fLanguage
    English
  • Journal_Title
    Security & Privacy, IEEE
  • Publisher
    ieee
  • ISSN
    1540-7993
  • Type

    jour

  • DOI
    10.1109/MSECP.2004.1264861
  • Filename
    1264861