Fifteen Months in the Life of a Honeyfarm

Conference Paper (2023)
Author(s)

Cristian Munteanu (Max Planck Institute)

Said Jawad Saidi (Max Planck Institute)

Oliver Gasser (Max Planck Institute)

Georgios Smaragdakis (Max Planck Institute, TU Delft - Cyber Security)

Anja Feldmann (Max Planck Institute)

Research Group
Cyber Security
Copyright
© 2023 Cristian Munteanu, Said Jawad Saidi, Oliver Gasser, G. Smaragdakis, Anja Feldmann
DOI related publication
https://doi.org/10.1145/3618257.3624826
More Info
expand_more
Publication Year
2023
Language
English
Copyright
© 2023 Cristian Munteanu, Said Jawad Saidi, Oliver Gasser, G. Smaragdakis, Anja Feldmann
Research Group
Cyber Security
Pages (from-to)
282-296
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Honeypots have been used for decades to detect, monitor, and understand attempts of unauthorized use of information systems. Previous studies focused on characterizing the spread of malware, e.g., Mirai and other attacks, or proposed stealthy and interactive architectures to improve honeypot efficiency.

In this paper, we present insights and benefits gained from collaborating with an operational honeyfarm, i.e., a set of honeypots distributed around the globe with centralized data collection. We analyze data of about 400 million sessions over a 15-month period, gathered from a globally distributed honeyfarm consisting of 221 honeypots deployed in 55 countries. Our analysis unveils stark differences among the activity seen by the honeypots-some are contacted millions of times while others only observe a few thousand sessions. We also analyze the behavior of scouters and intruders of these honeypots. Again, some honeypots report orders of magnitude more interactions with command execution than others. Still, diversity is needed since even if we focus on the honeypots with the highest visibility, they see only a small fraction of the intrusions, including only 5% of the files. Thus, although around 2% of intrusions are visible by most of the honeypots in our honeyfarm, the rest are only visible to a few. We conclude with a discussion of the findings of work.