An Application of Jeeves for Honeypot Sanitization

dc.contributor.authorWebster, Ashton
dc.date.accessioned2018-02-16T03:42:51Z
dc.date.available2018-02-16T03:42:51Z
dc.date.issued2018-02-15
dc.description.abstractBeing able to quickly create realistic honeypots is very useful for obtaining accurate information about attacker behavior. However, creating realistic honeypots requires sanitization of the original system from which the honeypot is derived. To achieve this the use of the Jeeves, a language based on faceted values, is extended to rapidly replace secret values with believable and non-interfering sanitized values. By making several changes to the source code of Jelf, a web server implemented in Jeeves, we are able to quickly and easily create sanitized honeypots. Our experiments show that the sanitized and unsanitized versions of Jelf only differ in response times by less than 1%.en_US
dc.identifierhttps://doi.org/10.13016/M2KW57K85
dc.identifier.urihttp://hdl.handle.net/1903/20500
dc.language.isoen_USen_US
dc.relation.ispartofseriesUM Computer Science Department;CS-TR-5057
dc.titleAn Application of Jeeves for Honeypot Sanitizationen_US
dc.typeTechnical Reporten_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
CS-TR-5057.pdf
Size:
290.61 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.57 KB
Format:
Item-specific license agreed upon to submission
Description: