蜜罐
计算机科学
软件部署
Python(编程语言)
脚本语言
计算机安全
远程登录
互联网
操作系统
万维网
文件传输协议
作者
Warren Z. Cabral,Craig Valli,Leslie F. Sikos,Samuel G. Wakeling
出处
期刊:IFIP advances in information and communication technology
日期:2021-01-01
卷期号:: 317-331
被引量:6
标识
DOI:10.1007/978-3-030-78120-0_21
摘要
Cowrie is a medium-interaction SSH, and Telnet honeypot used to record brute force attacks and SSH requests. Cowrie utilizes a Python codebase, which is maintained and publicly available on GitHub. Since its source code is publicly released, not only security specialists but cybercriminals can also analyze it. Nonetheless, cybersecurity specialists deploy most honeypots with default configurations. This outcome is because modern computer systems and infrastructures do not provide a standard framework for optimal deployment of these honeypots based on the various configuration options available to produce a non-default configuration. This option would allow them to act as effective deceptive systems. Honeypot deployments with default configuration settings are easier to detect because cybercriminals have known scripts and tools such as NMAP and Shodan for identifying them. This research aims to develop a framework that enables for the customized configuration of the Cowrie honeypot, thereby enhancing its functionality to achieve a high degree of deceptiveness and realism when presented to the Internet. A comparison between the default and configured deployments is further conducted to prove the modified deployments’ effectiveness.
科研通智能强力驱动
Strongly Powered by AbleSci AI