Presentation | 2010-07-08 Investigation and Evaluation of Attack Monitoring Methods Using Web Honeypots Takeshi YAGI, Alberto CHAN, Naoto TANIMOTO, Takeo HARIU, Mitsutaka ITOH, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | In recent years, web-based applications have gained popularity due to the emergence of the trends such as netbooks and cloud computing. This popularity, along with the emphasis on personalization, has lead to the development of many web applications developed by many people. Due to negligence in secure coding, many of these web applications contain vulnerabilities. This has attracted the attention of attackers who want to exploit these security vulnerabilities to hack the web applications. Malicious users who may illicitly use these web applications and the data contained in their databases pose a constant threat. Therefore, it is necessary to protect these web applications as well as the servers on which they run. In order to effectively protect the web applications, a method of monitoring and analyzing attack is necessary in addition to the conventional intrusion detection systems. Honeypots are highly versatile security tools with various applications to internet security. They are computing resources where their value lies in the information they capture while being probed, attacked, or compromised. In this paper, we will discuss the investigation and evaluation of two web honeypots-the High Interaction Honeypot Analysis Tool and the DShield Web Honeypot as well as our proposal for a hybrid honeypot based on the results. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | security / malware / website / web honeypot |
Paper # | IN2010-29 |
Date of Issue |
Conference Information | |
Committee | IN |
---|---|
Conference Date | 2010/7/1(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Networks (IN) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Investigation and Evaluation of Attack Monitoring Methods Using Web Honeypots |
Sub Title (in English) | |
Keyword(1) | security |
Keyword(2) | malware |
Keyword(3) | website |
Keyword(4) | web honeypot |
1st Author's Name | Takeshi YAGI |
1st Author's Affiliation | NTT Information Sharing Platform Laboratories, NTT Corporation() |
2nd Author's Name | Alberto CHAN |
2nd Author's Affiliation | The University of British Columbia |
3rd Author's Name | Naoto TANIMOTO |
3rd Author's Affiliation | NTT Information Sharing Platform Laboratories, NTT Corporation |
4th Author's Name | Takeo HARIU |
4th Author's Affiliation | NTT Information Sharing Platform Laboratories, NTT Corporation |
5th Author's Name | Mitsutaka ITOH |
5th Author's Affiliation | NTT Information Sharing Platform Laboratories, NTT Corporation |
Date | 2010-07-08 |
Paper # | IN2010-29 |
Volume (vol) | vol.110 |
Number (no) | 116 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |