Emulating a High Interaction Honeypot to Monitor Intrusion Activity

dc.contributor.authorGopalakrishna, A.
dc.contributor.authorPais, A.R.
dc.date.accessioned2020-03-30T10:18:00Z
dc.date.available2020-03-30T10:18:00Z
dc.date.issued2013
dc.description.abstractIntrusion activity monitoring is a complex task to achieve. An intruder should not be alerted about being monitored. A stealthy approach is needed, that does not alert the intruder about the presence of monitoring. Virtual Machine based High Interaction Honeypots help achieve stealthy monitoring. Most of the related research work use the concept of Virtual Machine Introspection that relies on System Call Interception. However most of these methods hook the sysenter instruction for interception of system calls. This can be defeated by an intruder since this is not the only way of making a system call. We have designed and implemented a High-Interaction Virtual Machine based honeypot using the open source tool Qebek. Qebek is more effective as it hooks the actual system call implementation itself. We have tested its capturability by running different types of malware. The Results obtained show that the system is able to capture information about processes running on the honeypot, console data and network activities, which reveal the maliciousness of the activities. � Springer-Verlag Berlin Heidelberg 2013.en_US
dc.identifier.citationCommunications in Computer and Information Science, 2013, Vol.377 CCIS, , pp.70-76en_US
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/8024
dc.titleEmulating a High Interaction Honeypot to Monitor Intrusion Activityen_US
dc.typeBook chapteren_US

Files