The Role of Deception in Securing Our Cyberspace: Honeypots Are a Viable Option

The Role of Deception in Securing Our Cyberspace: Honeypots Are a Viable Option

Banyatsang Mphago (Botswana International University of Science and Technology, Botswana), Dimane Mpoeleng (Botswana International University of Science and Technology, Botswana), and Shedden Masupe (Botswana Institute for Technology Research and Innovation, Botswana)
DOI: 10.4018/978-1-7998-9430-8.ch005
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The use of deception systems is a viable option in reducing the never-ending tussle between the attackers and the defenders. The deception systems give the defenders an edge over their counterparts since they provide the platform to learn the methods and techniques the attackers use. However, the effectiveness of the deception system is highly dependent on how they truly hide their identity. A deceptive honeypot has the capacity to persuade and change the cognitive behavior of an attacker. An attacker whose cognitive behavior has been altered by the deception capabilities of a honeypot is more likely to reveal his attack methods; hence, the defenders are able to learn how to defend against those future attacks.
Chapter Preview
Top

Background

Honeypot Definitions

Honeypots are special systems designed to track and trap attackers and learn their attack methods. They are special in the sense that they are not a solution but rather a general technology that do not solve a specific security problem which is continuously changing, and can be involved in many facets of security such as information gathering, detection, and prevention (Verizon, 2019). Security researchers and administrators often use honeypots to unobtrusively track and monitor what malicious attackers are doing in order to compromise computer resources. A honeypot is a tool designed to learn the attack methods the adversaries use to query and exploit vulnerabilities in a system. So, a honeypot is a security resource whose value lies in being probed, attacked, or compromised (WhiteHatSecurity, 2016).

Several definitions for the term `honeypot' have been proposed, and below we present some of those definitions:

  • Definition 1: “a honeypot is a security resource whose value lies in being probed, attacked and compromised” (Spitzner, 2002).

  • Definition 2: “a honeypot is a computer which has been configured to some extent to seem normal to an attacker, but actually logs and observes what the attacker does” (Gibbens, 1999).

  • Definition 3: “a honeypot is a general computing resource whose sole task is to be probed, attacked, and compromised, used or accessed in any other unauthorized way” (Grudziecki et al., 2012).

For the purpose of this chapter, we adopt definition 1 mainly because rather than being specific to a particular security resource like the rest, the definition describes a honeypot in a more general sense, of which we believe a general term `honeypot' should be defined.

Key Terms in this Chapter

Local Descriptor Table (LDT): A memory table used in the x86 architecture in protected mode and containing memory segment descriptors: address start in linear memory, size, executability, writability, access privilege, actual presence in memory, etc.

Decision Theory: A branch of applied probability theory concerned with the theory of making decisions based on assigning probabilities to various factors and assigning numerical consequences to the outcome.

Global Descriptor Table (GDT): A data structure used by Intel x86-family processors starting with the 80286 to define the characteristics of the various memory areas used during program execution, including the base address, the size, and access privileges like executability and writability.

User-Mode Linux: An architectural port of the Linux kernel to its own system call interface, which enables multiple virtual Linux kernel-based operating systems to run as an application within a normal Linux system.

Complete Chapter List

Search this Book:
Reset