Abstract
In this paper we discuss the challenges faced whilst developing exclusion lists for the high-interaction client honeypot, Capture-HPC. Exclusion lists are Capture client system behaviours which are used in the decision making process when determining if a particular behaviour is malicious or benign. As exclusion lists are the main decision making method used by Capture-HPC to classify a given webpage as benign or malicious, we identify a number of issues with current research which are often overlooked. Exclusion lists by nature require constant updating as they are developed to meet the specific requirements of a particular operating system, web browser and application system environment. Any changes to these would mean the possibility of a given client to display different benign behaviour which consequently means new exclusions required. As a result of their specific version requirements, exclusion lists are not transferable from clients. We propose a set of recommendations to aid in the creation of exclusion lists. We also present and discuss some common drive-by-download attacks which we have captured using our Windows 7 compatible exclusion lists.
Original language | English |
---|---|
Title of host publication | Procs of the 7th Int Conf on Security of Information and Networks |
Publisher | ACM Press |
Pages | 334-338 |
ISBN (Print) | 978-1-4503-3033-6 |
DOIs | |
Publication status | Published - 9 Sept 2014 |
Event | 7th International Conference on Security of Information and Networks - Glasgow, United Kingdom Duration: 9 Sept 2014 → 11 Sept 2014 |
Conference
Conference | 7th International Conference on Security of Information and Networks |
---|---|
Country/Territory | United Kingdom |
City | Glasgow |
Period | 9/09/14 → 11/09/14 |