Preface |
|
v | |
|
|
1 | (37) |
|
|
2 | (5) |
|
1.1.1 History and Evolution of Honeypots |
|
|
6 | (1) |
|
|
7 | (3) |
|
1.2.1 Generic Honeypot Model |
|
|
8 | (2) |
|
1.3 Honeypots vs. Firewalls and Intrusion Detection Systems |
|
|
10 | (4) |
|
|
11 | (1) |
|
1.3.2 Intrusion Detection Systems |
|
|
11 | (1) |
|
|
12 | (2) |
|
1.4 Classification of Honeypots |
|
|
14 | (7) |
|
|
14 | (1) |
|
1.4.2 Based on Level of Interaction |
|
|
15 | (4) |
|
1.4.3 Based on Hardware Deployment Type |
|
|
19 | (1) |
|
1.4.4 Based on Role of Honeypot |
|
|
19 | (2) |
|
1.5 Placement of Honeypots |
|
|
21 | (5) |
|
|
21 | (2) |
|
|
23 | (1) |
|
|
24 | (2) |
|
|
26 | (1) |
|
1.6 Varieties of Honeypots: Honeytokens, Honeypages, Honeynets and Honeyfarms |
|
|
26 | (2) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (4) |
|
1.7.1 Low False-Positives |
|
|
28 | (1) |
|
|
28 | (1) |
|
1.7.3 New Threat Detection |
|
|
29 | (1) |
|
|
29 | (1) |
|
1.7.5 Other Advantages of Honeypots |
|
|
30 | (2) |
|
|
32 | (1) |
|
1.9 Key Issues and Challenges |
|
|
33 | (1) |
|
|
34 | (4) |
|
|
34 | (2) |
|
|
36 | (2) |
|
2 Commercially Available Honeypots |
|
|
38 | (25) |
|
2.1 Back Officer Friendly |
|
|
39 | (11) |
|
|
50 | (7) |
|
|
57 | (2) |
|
|
59 | (2) |
|
|
61 | (2) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (28) |
|
3.1 Overview of Honeynets |
|
|
63 | (1) |
|
|
64 | (5) |
|
3.2.1 Methods, Motives, and Evolving Tools |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
67 | (2) |
|
|
69 | (1) |
|
|
69 | (4) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
3.4 Honeynet Architectures |
|
|
73 | (14) |
|
|
74 | (8) |
|
|
82 | (5) |
|
3.5 Sweetening the Honeynets |
|
|
87 | (1) |
|
3.6 Risks Associated with Honeynets |
|
|
88 | (1) |
|
|
89 | (2) |
|
|
90 | (1) |
|
|
90 | (1) |
|
4 Attacks and Role of Honeypots |
|
|
91 | (29) |
|
4.1 Phases of Attack and Honeypots |
|
|
92 | (3) |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
94 | (1) |
|
4.2 Worms and Virus Attacks |
|
|
95 | (7) |
|
|
95 | (5) |
|
|
100 | (2) |
|
4.3 Spam and Phishing Mails |
|
|
102 | (11) |
|
|
103 | (8) |
|
|
111 | (2) |
|
4.4 Distributed Denial of Service Attacks |
|
|
113 | (5) |
|
|
118 | (2) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
120 | (20) |
|
5.1 Honeypot as Detection Systems |
|
|
121 | (5) |
|
5.1.1 Japonica: Objectives and Requirements |
|
|
121 | (1) |
|
5.1.2 Framework and Components |
|
|
122 | (4) |
|
5.2 Honeypot as Deception Systems |
|
|
126 | (11) |
|
|
137 | (3) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
140 | (29) |
|
6.1 Virtual Honeypot: VMware Workstation |
|
|
141 | (1) |
|
6.2 Data Capture on Virtual Honeypots |
|
|
142 | (2) |
|
6.3 Raw Disks and Virtual Disks |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
146 | (21) |
|
|
167 | (2) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
169 | (18) |
|
7.1 Issues with Static Honeypots |
|
|
169 | (1) |
|
|
170 | (4) |
|
7.3 Dynamic Honeypot Design |
|
|
174 | (6) |
|
7.3.1 Proposed Design Overview |
|
|
175 | (2) |
|
|
177 | (1) |
|
7.3.3 Passive Fingerprinting |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
179 | (1) |
|
7.3.6 Dynamic Honeypot Engine |
|
|
179 | (1) |
|
7.4 Dynamic Honeypot Construction |
|
|
180 | (5) |
|
7.4.1 Graphic User Interface |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
185 | (2) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
187 | (50) |
|
8.1 Introduction to Wireless Local Area Networks |
|
|
188 | (3) |
|
8.2 Basic Wireless Concepts |
|
|
191 | (4) |
|
|
191 | (1) |
|
8.2.2 Infrastructure and Ad Hoc Modes |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
195 | (5) |
|
8.3.1 Access Control List |
|
|
195 | (1) |
|
8.3.2 WEP (Wired Equivalent Privacy) |
|
|
195 | (4) |
|
8.3.3 WPA (Wi-Fi Protected Access) |
|
|
199 | (1) |
|
|
199 | (1) |
|
8.4 Wireless Attacks: From A Blackhat's Perspective |
|
|
200 | (9) |
|
8.4.1 Passive Attacks on Wireless Networks |
|
|
200 | (2) |
|
8.4.2 Active Attacks on Wireless Networks |
|
|
202 | (1) |
|
8.4.3 Man-in-the-Middle Attacks on Wireless Networks |
|
|
203 | (1) |
|
8.4.4 Jamming Attacks on Wireless Networks |
|
|
204 | (1) |
|
|
205 | (4) |
|
|
209 | (23) |
|
8.5.1 Needs and Goals of Wireless Honeypots |
|
|
209 | (1) |
|
8.5.2 Wireless Honeypot History |
|
|
210 | (3) |
|
|
213 | (1) |
|
|
214 | (1) |
|
8.5.5 Wireless Architectures |
|
|
215 | (6) |
|
8.5.6 Some Practical examples to create Honeypots |
|
|
221 | (4) |
|
8.5.7 Existing Wireless Architectures on Wireless Honeypots |
|
|
225 | (2) |
|
|
227 | (3) |
|
8.5.9 Wireless Honeypot using Wired Tools |
|
|
230 | (2) |
|
|
232 | (1) |
|
|
233 | (4) |
|
|
234 | (1) |
|
|
235 | (2) |
|
9 Applications of Honeypots |
|
|
237 | (12) |
|
9.1 Defense against Automated Attacks |
|
|
237 | (2) |
|
9.2 Protection against Human Intruders |
|
|
239 | (1) |
|
9.3 Surgical Detection Methods |
|
|
239 | (1) |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
242 | (4) |
|
|
246 | (1) |
|
|
246 | (1) |
|
|
246 | (3) |
|
|
247 | (1) |
|
|
248 | (1) |
|
10 Anti-Honeypot Technology |
|
|
249 | (49) |
|
|
250 | (9) |
|
10.1.1 Honeypot and Fingerprinting: Practical Examples |
|
|
251 | (8) |
|
|
259 | (14) |
|
10.3 Techniques For Honeypot Detection |
|
|
273 | (16) |
|
|
274 | (4) |
|
10.3.2 Honeypot Detection in Advanced Botnet Attacks |
|
|
278 | (9) |
|
10.3.3 Mapping Internet Sensors With Probe Response Attacks |
|
|
287 | (2) |
|
10.4 Countermeasure for Detection of Honeypot Deployment |
|
|
289 | (7) |
|
10.4.1 The Honeyanole System |
|
|
290 | (4) |
|
10.4.2 A Hybrid Honeypot Architecture for Scalable Network Monitoring |
|
|
294 | (2) |
|
|
296 | (2) |
|
|
297 | (1) |
|
|
297 | (1) |
|
11 Honeypots and Network Forensics |
|
|
298 | (27) |
|
|
300 | (5) |
|
11.1.1 Classification of Network Forensics Systems |
|
|
301 | (2) |
|
11.1.2 Motivation for Network Forensics |
|
|
303 | (1) |
|
11.1.3 Honeypot approaches for Network Forensics |
|
|
304 | (1) |
|
11.2 Honeypot as Network Forensic Analysis Tools |
|
|
305 | (6) |
|
11.3 Honeypot Based Network Forensics Frameworks |
|
|
311 | (9) |
|
11.3.1 Generic Process Model |
|
|
312 | (3) |
|
11.3.2 Honeypot Based Frameworks for Forensics |
|
|
315 | (5) |
|
|
320 | (5) |
|
|
321 | (1) |
|
|
322 | (3) |
Index |
|
325 | |