In this paper we discuss the challenges faced whilst developing exclusion lists for the high-interaction client honeypot, Capture-HPC. Exclusion lists are Capture client system behaviours which are used in the decision making process when determining if a particular behaviour is malicious or benign. As exclusion lists are the main decision making method used by Capture-HPC to classify a given webpage as benign or malicious, we identify a number of issues with current research which are often overlooked. Exclusion lists by nature require constant updating as they are developed to meet the specific requirements of a particular operating system, web browser and application system environment. Any changes to these would mean the possibility of a given client to display different benign behaviour which consequently means new exclusions required. As a result of their specific version requirements, exclusion lists are not transferable from clients. We propose a set of recommendations to aid in the creation of exclusion lists. We also present and discuss some common drive-by-download attacks which we have captured using our Windows 7 compatible exclusion lists.
|Title of host publication||Procs of the 7th Int Conf on Security of Information and Networks|
|Publication status||Published - 9 Sep 2014|
|Event||7th International Conference on Security of Information and Networks - Glasgow, United Kingdom|
Duration: 9 Sep 2014 → 11 Sep 2014
|Conference||7th International Conference on Security of Information and Networks|
|Period||9/09/14 → 11/09/14|