HoneyFactory: Container-Based Comprehensive Cyber Deception Honeynet Architecture
Abstract
:1. Introduction
- We propose a container-based cyber deception honeynet architecture, called HoneyFactory, which is more comprehensive than existing honeynet architectures and can provide a more realistic network deception environment. This architecture can capture deeper and more types of attack information. HoneyFactory also performs better than existing honeynet architecture in current honeynet test metrics.
- In HoneyFactory, we propose an environment learning and honeynet generation mechanism that can dynamically generate simulation honeynets based on business network under protection.
- In HoneyFactory, we propose a honeynet deception model based on the Gaussian Hidden Markov theory. Compared to previous honeynet that maintains the connection between attacker and a single honeypot, the honeynet deception implementation technology proposed in this paper evaluates attack stage, automatically arranges deception honeynet, and performs deep cyber deception. In stage evaluation problem, this model performs better than the existing models.
- We evaluate the performance of honeynet systems from multiple perspectives and propose novel test metrices for honeynet architecture.
2. Research Status of Honeynet
3. HoneyFactory Framework Design
3.1. Overview
3.2. Environment Learning Module
3.3. Honeynet Generation Module
3.4. Honeynet Deception Model
3.5. Honeynet Data Collection Module
4. Implementation
5. Evaluation
5.1. Honeynet Communication Evaluation
5.2. Honeynet Simulation Evaluation
5.3. Honeynet Deception Model Training and Validation
5.4. Honeynet Deception Effect Evaluation
5.5. Comparison with Other Studies
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Lackner, P. How to Mock a Bear: Honeypot, Honeynet, Honeywall & Honeytoken: A Survey. In Proceedings of the ICEIS, Online, 26–28 April 2021. [Google Scholar]
- Krishnaveni, S.; Prabakaran, S.; Sivamohan, S. A survey on honeypot and honeynet systems for intrusion detection in cloud environment. J. Comput. Theor. Nanosci. 2018, 15, 2949–2953. [Google Scholar] [CrossRef]
- Oza, A.D.; Kumar, G.N.; Khorajiya, M. Survey of snaring cyber attacks on IoT devices with honeypots and honeynets. In Proceedings of the 2018 3rd International Conference for Convergence in Technology (I2CT), Pune, India, 6–8 April 2018. [Google Scholar]
- Spitzner, L. The honeynet project: Trapping the hackers. IEEE Secur. Priv. 2003, 1, 15–23. [Google Scholar] [CrossRef]
- Abbasi, F.H.; Harris, R.J. Experiences with a generation iii virtual honeynet. In Proceedings of the 2009 Australasian Telecommunication Networks and Applications Conference (ATNAC), Canberra, ACT, Australia, 10–12 November 2009. [Google Scholar]
- Jain, P.; Sardana, A. Defending against internet worms using honeyfarm. In Proceedings of the CUBE International Information Technology Conference, Pune, India, 3–6 September 2012. [Google Scholar]
- Hybrid Honeypot Framework. Available online: http://honeybrid.sourceforge.net (accessed on 1 September 2023).
- Jiang, X.; Xu, D.; Wang, Y.M. Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention. J. Parallel Distrib. Comput. 2006, 66, 1165–1180. [Google Scholar] [CrossRef]
- Han, W.; Zhao, Z.; Doupe, A.; Ahn, G. Honeymix: Toward sdn-based intelligent honeynet. In Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, New Orleans, LA, USA, 11 March 2016. [Google Scholar]
- Kyung, S.; Han, W.; Tiwari, N.; Dixit, V.; Srinivas, L.; Zhao, Z.; Doupe, A.; Ahn, G. HoneyProxy: Design and implementation of next-generation honeynet via SDN. In Proceedings of the 2017 IEEE Conference on Communications and Network Security (CNS), Las Vegas, NV, USA, 9–11 October 2017. [Google Scholar]
- Silva, D.V.; Rafael, G.D.R. A review of the current state of Honeynet architectures and tools. Int. J. Secur. Netw. 2017, 12, 255–272. [Google Scholar] [CrossRef]
- Franco, J.; Aris, A.; Canberk, B.; Uluagac, A. A survey of honeypots and honeynets for internet of things, industrial internet of things, and cyber-physical systems. IEEE Commun. Surv. Tutor. 2021, 23, 2351–2383. [Google Scholar] [CrossRef]
- Dalamagkas, C.; Sarigiannidis, P.; Ioannidis, D.; Iturbe, E.; Nikolis, O.; Ramos, F.; Rios, E.; Sarigiannidis, A.; Tzovaras, D. A survey on honeypots, honeynets and their applications on smart grid. In Proceedings of the 2019 IEEE Conference on Network Softwarization (NetSoft), Paris, France, 24–28 June 2019. [Google Scholar]
- Tan, L.; Yu, K.; Ming, F. Secure and resilient artificial intelligence of things: A HoneyNet approach for threat detection and situational awareness. IEEE Consum. Electron. Mag. 2021, 11, 69–78. [Google Scholar] [CrossRef]
- Zhang, W.; Zhang, B.; Zhou, Y.; He, H.; Ding, Z. An IoT honeynet based on multiport honeypots for capturing IoT attacks. IEEE Internet Things J. 2019, 7, 3991–3999. [Google Scholar] [CrossRef]
- Kokolakis, G.; Ntousakis, G.; Karatsoris, I. HoneyChart: Automated Honeypot Management over Kubernetes. In European Symposium on Research in Computer Security; Springer: Cham, Switzerland, 2022. [Google Scholar]
- Hecker, C.; Hay, B. Automated honeynet deployment for dynamic network environment. In Proceedings of the 2013 46th Hawaii International Conference on System Sciences, Wailea, HI, USA, 7–10 January 2013. [Google Scholar]
- Meng, X.; Zhao, Z.; Li, R.; Zhang, H. An intelligent honeynet architecture based on software defined security. In Proceedings of the 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 11–13 October 2017. [Google Scholar]
- Wang, Z.; Li, G.; Chi, Y.; Zhang, J.; Liu, Q.; Yang, T.; Zhou, W. Honeynet construction based on intrusion detection. In Proceedings of the 3rd International Conference on Computer Science and Application Engineering, Sanya, China, 22–24 October 2019. [Google Scholar]
- Krueger, T.; Krämer, N.; Rieck, K. ASAP: Automatic semantics-aware analysis of network payloads. In Privacy and Security Issues in Data Mining and Machine Learning; Springer: Berlin/Heidelberg, Germany, 2010. [Google Scholar]
- Herzberg, A.; Shulman, H.; Ullrich, J.; Weippl, E. Cloudoscopy: Services discovery and topology mapping. In Proceedings of the 2013 ACM Workshop on Cloud Computing Security Workshop, Berlin, Germany, 8 November 2013. [Google Scholar]
- Gupta, C. HoneyKube: Designing a Honeypot Using Microservices-Based Architecture; University of Twente: Enschede, The Netherlands, 2021. [Google Scholar]
- Yin, Y.; Shao, Y.; Wang, X.F.; Su, Q. A flexible cyber security experimentation platform architecture based on docker. In Proceedings of the 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C), Sofia, Bulgaria, 22–26 July 2019. [Google Scholar]
- Bercovitch, M.; Renford, M.; Hasson, L.; Shabtai, A.; Rokach, L.; Elovici, Y. HoneyGen: An automated honeytokens generator. In Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, Beijing, China, 10–12 July 2011. [Google Scholar]
- Chaddad, L.; Chehab, A.; Elhajj, I.H.; Kayssi, A. Optimal packet camouflage against traffic analysis. ACM Trans. Priv. Secur. (TOPS) 2021, 24, 1–23. [Google Scholar] [CrossRef]
- Fan, W.; Du, Z.; Smith-Creasey, M.; Fernandez, D. Honeydoc: An efficient honeypot architecture enabling all-round design. IEEE J. Sel. Areas Commun. 2019, 37, 683–697. [Google Scholar] [CrossRef]
- Casalicchio, E. Container orchestration: A survey. Syst. Model. Methodol. Tools 2019, 1, 221–235. [Google Scholar]
- A Cloud-Native Honeynet Automation and Orchestration Framework Hybrid Honeypot Framework. Available online: https://osf.io/xkqzr/download (accessed on 1 September 2023).
- Glastopf. Available online: https://github.com/mushorg/glastopf (accessed on 1 September 2023).
- Kippo. Available online: https://github.com/desaster/kippo (accessed on 1 September 2023).
- Xuan, G.; Zhang, W.; Chai, P. EM algorithms of Gaussian mixture model and hidden Markov model. In Proceedings of the 2001 International Conference on Image Processing, Thessaloniki, Greece, 7–10 October 2001. [Google Scholar]
- Almohannadi, H.; Awan, I.; Hamar, A.J.; Cullen, A.; Disso, P.J.; Armitage, L. Cyber threat intelligence from honeypot data using elasticsearch. In Proceedings of the 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), Krakow, Poland, 16–18 May 2018. [Google Scholar]
- Moore, C.; Nemrat, A.A. An analysis of honeypot programs and the attack data collected. In Proceedings of the Global Security, Safety and Sustainability: Tomorrow’s Challenges of Cyber Security: 10th International Conference, London, UK, 15–17 September 2015. [Google Scholar]
- Hwang, R.H.; Peng, M.C.; Nguyen, V.L.; Chang, Y.L. An LSTM-based deep learning approach for classifying malicious traffic at the packet level. Appl. Sci. 2019, 9, 3414. [Google Scholar] [CrossRef]
- Agarap, A.F.M. A neural network architecture combining gated recurrent unit (GRU) and support vector machine (SVM) for intrusion detection in network traffic data. In Proceedings of the 2018 10th International Conference on Machine Learning and Computing, Macau, China, 26–28 February 2018. [Google Scholar]
- Vinayakumar, R.; Soman, K.P.; Poornachandran, P. Applying convolutional neural network for network intrusion detection. In Proceedings of the 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India, 13–16 September 2017. [Google Scholar]
- Wang, M.; Lu, Y.; Qin, J. A dynamic MLP-based DDoS attack detection method using feature selection and feedback. Comput. Secur. 2020, 88, 101645. [Google Scholar] [CrossRef]
- Qassrawi, M.T.; Hongli, Z. Deception methodology in virtual honeypots. In Proceedings of the 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, China, 24–25 April 2010. [Google Scholar]
Model | Network Simulation | Host Simulation | Service Simulation |
---|---|---|---|
HoneyFactory | 100% (3/3) | 100% (60/60) | 91.6% (870/950) |
Iteration | Honeynet Deception Model | LSTM [34] | GRU [35] | CNN [36] | MLP [37] | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
ACC | F1 | Rec | Time | ACC | F1 | Rec | Time | ACC | F1 | Rec | Time | ACC | F1 | Rec | Time | ACC | F1 | Rec | Time | |
10 | 0.355 | 0.362 | 0.366 | 2 m | 0.336 | 0.315 | 0.318 | 7 m | 0.308 | 0.295 | 0.297 | 6 m | 0.190 | 0.186 | 0.210 | 9 m | 0.238 | 0.219 | 0.229 | 5 m |
20 | 0.482 | 0.486 | 0.491 | 4 m | 0.434 | 0.405 | 0.407 | 14 m | 0.393 | 0.375 | 0.377 | 13 m | 0.301 | 0.297 | 0.309 | 20 m | 0.398 | 0.410 | 0.434 | 10 m |
30 | 0.586 | 0.583 | 0.584 | 6 m | 0.541 | 0.516 | 0.517 | 21 m | 0.506 | 0.490 | 0.491 | 20 m | 0.422 | 0.422 | 0.429 | 30 m | 0.479 | 0.487 | 0.500 | 15 m |
40 | 0.678 | 0.687 | 0.690 | 8 m | 0.619 | 0.596 | 0.598 | 28 m | 0.587 | 0.572 | 0.574 | 27 m | 0.508 | 0.510 | 0.516 | 38 m | 0.554 | 0.554 | 0.564 | 20 m |
50 | 0.721 | 0.735 | 0.737 | 9 m | 0.708 | 0.690 | 0.692 | 34 m | 0.674 | 0.664 | 0.667 | 33 m | 0.600 | 0.605 | 0.612 | 49 m | 0.611 | 0.602 | 0.612 | 25 m |
60 | 0.776 | 0.781 | 0.784 | 11 m | 0.767 | 0.754 | 0.758 | 42 m | 0.743 | 0.735 | 0.740 | 40 m | 0.668 | 0.675 | 0.685 | 58 m | 0.623 | 0.612 | 0.621 | 29 m |
70 | 0.814 | 0.822 | 0.825 | 13 m | 0.793 | 0.781 | 0.785 | 50 m | 0.774 | 0.766 | 0.771 | 46 m | 0.705 | 0.711 | 0.720 | 68 m | - | - | - | - |
80 | 0.842 | 0.846 | 0.847 | 15 m | 0.808 | 0.797 | 0.798 | 58 m | 0.790 | 0.781 | 0.785 | 52 m | 0.719 | 0.720 | 0.725 | 80 m | - | - | - | - |
90 | 0.864 | 0.864 | 0.866 | 16 m | - | - | - | - | - | - | - | - | 0.734 | 0.732 | 0.736 | 92 m | - | - | - | - |
100 | 0.879 | 0.875 | 0.878 | 18 m | - | - | - | - | - | - | - | - | 0.745 | 0.740 | 0.744 | 104 m | - | - | - | - |
110 | 0.886 | 0.882 | 0.884 | 20 m | - | - | - | - | - | - | - | - | 0.753 | 0.747 | 0.750 | 115 m | - | - | - | - |
130 | - | - | - | - | - | - | - | - | - | - | - | - | 0.758 | 0.751 | 0.753 | 140 m | - | - | - | - |
Stage ID | Stage Name | Attack Method |
---|---|---|
1 | Reconnaissance | Nmap, Metasploit ssh_login, Nikto, Dirbuster |
2 | Exploitation and Persistent | sqlmap, php reverse shell, web component and server vulnerability exploitation by burpsuite |
3 | Exfiltration and Control | dns covert channel, ftp, scp, dga |
4 | Discovery and Lateral Movement | Nmap, MySql vulnerability exploitation, vsFTP vulnerability exploitation, Metasploit unix exploitation |
Stage ID | Stage Name | Deception Actions |
---|---|---|
1 | Reconnaissance | Deploy kippo SSH traditional honeypot, cowrie ssh/telnet traditional honeypot, simulation honeypots |
2 | Exploitation and Persistent | Deploy glastopf web traditional honeypot, honeypots with real web vulnerability |
3 | Exfiltration and Control | Create image from attacked container |
4 | Discovery and Lateral Movement | Deploy honeyprint traditional honeypot, honey-FTP traditional honeypot, honeypots with real database vulnerability, honeypots with Linux vulnerability |
Stage ID | Stage Name | Deception Success Rate | Overall Rate |
---|---|---|---|
1 | Reconnaissance | 82.3% (56/68) | 71.3% |
2 | Exploitation and Persistent | 53.2% (33/62) | |
3 | Exfiltration and Control | 66.1% (39/62) | |
4 | Discovery and Lateral Movement | 85.4% (53/62) |
Honeynet Name | Honeynet Communication Latency | Honeynet Connection Reduction | Honeynet Deception Effect Evaluation | Honeynet Simulation | Honeypots Accessible to Attacker | Honeypot Scale | Honeynet Data Collection |
---|---|---|---|---|---|---|---|
HoneyFactory | 0.4–0.8 ms | 30% | 71.3% | High, automatic learning | Multiple | About 100 | High |
Honeymix [9] | Qualitative description | Low | Single | 5–10 | Low | ||
Honeyproxy [10] | 0.5–1.2 ms | 41–55% | Qualitative description | Low | Single | 5–10 | Low |
Honeychart [16] | - | - | - | High, manual configuration required | Multiple | - | Low |
Honeywall [5] | - | - | - | High, manual configuration required | Multiple | 3 | Low |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yu, T.; Xin, Y.; Zhang, C. HoneyFactory: Container-Based Comprehensive Cyber Deception Honeynet Architecture. Electronics 2024, 13, 361. https://doi.org/10.3390/electronics13020361
Yu T, Xin Y, Zhang C. HoneyFactory: Container-Based Comprehensive Cyber Deception Honeynet Architecture. Electronics. 2024; 13(2):361. https://doi.org/10.3390/electronics13020361
Chicago/Turabian StyleYu, Tianxiang, Yang Xin, and Chunyong Zhang. 2024. "HoneyFactory: Container-Based Comprehensive Cyber Deception Honeynet Architecture" Electronics 13, no. 2: 361. https://doi.org/10.3390/electronics13020361
APA StyleYu, T., Xin, Y., & Zhang, C. (2024). HoneyFactory: Container-Based Comprehensive Cyber Deception Honeynet Architecture. Electronics, 13(2), 361. https://doi.org/10.3390/electronics13020361