Title
Detect Me If You… Oh Wait. An Internet-Wide View of Self-Revealing Honeypots
Abstract
Open-source honeypots are a vital component in the protection of networks and the observation of trends in the threat landscape. Their open nature also enables adversaries to identify the characteristics of these honeypots in order to detect and avoid them. In this study, we investigate the prevalence of 14 open- source honeypots running more or less default configurations, making them easily detectable by attackers. We deploy 20 simple signatures and test them for false positives against servers for domains in the Alexa top 10,000, official FTP mirrors, mail servers in real operation, and real IoT devices running telnet. We find no matches, suggesting good accuracy. We then measure the Internet-wide prevalence of default open-source honeypots by matching the signatures with Censys scan data and our own scans. We discovered 19,208 honeypots across 637 Autonomous Systems that are trivially easy to identify. Concentrations are found in research networks, but also in enterprise, cloud and hosting networks. While some of these honeypots probably have no operational relevance, e.g., they are student projects, this explanation does not fit the wider population. One cluster of honeypots was confirmed to belong to a well-known security center and was in use for ongoing attack monitoring. Concentrations in an another cluster appear to be the result of government incentives. We contacted 11 honeypot operators and received response from 4 operators, suggesting the problem of lack of network hygiene. Finally, we find that some honeypots are actively abused by attackers for hosting malicious binaries. We notified the owners of the detected honeypots via their network operators and provided recommendations for customization to avoid simple signature-based detection. We also shared our results with the honeypot developers.
Year
Venue
Keywords
2019
2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)
hosting networks,simple signature-based detection,Internet-wide view,self-revealing honeypots,default open-source honeypots,cloud network,FTP mirror,mail server,IoT device,Censys scan data,attack monitoring,government incentive
Field
DocType
ISSN
File Transfer Protocol,Population,Honeypot,Telnet,Computer science,Server,Computer network,Autonomous system (Internet),Cloud computing,The Internet
Conference
1573-0077
ISBN
Citations 
PageRank 
978-1-7281-0618-2
0
0.34
References 
Authors
0
8
Name
Order
Citations
PageRank
Shun Morishita100.34
Takuya Hoizumi200.34
Wataru Ueno300.68
Rui Tanabe401.69
Carlos Gañán503.38
Michel van Eeten614418.21
Katsunari Yoshioka714722.92
Tsutomu Matsumoto81156197.58