作者: Sushant Sinha , Michael Bailey , Farnam Jahanian , None
DOI:
关键词:
摘要: A popular approach to detecting and characterizing threats such as worms botnets involves the use of sacrificial host collections called honeynets. These are explicitly deployed be scanned, compromised, used in attacks. Unfortunately, existing approaches deploying honeynets largely ignore problem configuring operating systems applications on individual hosts, leaving user configure them a manual often ad hoc fashion. In this paper, we demonstrate that configurations inadequate–they misrepresent security landscape networks they trying protect relatively easy for attackers discover. We show manually building with good visibility resistance discovery is hard, each network has its own unique threat vulnerability spaces, potential number hosts honeynet quite large. Therefore, need automated assist administrators configurations. argue individually consistent proportional representation will achieve two desired goals into attacks discovery. develop an technique based profiling random sampling generate these Through experimental evaluation deployment generated by our technique, significantly more higher than current methods.