APT Detection System Using Honeypots
APT Detection System Using Honeypots
Abstract: - Recently emerged threat type of Advanced Persistent Threats (APTs). APTs continuously gather
information and data on specific targets, using various attack techniques examine the vulnerabilities of the
target and then perform the data obtained by hacking. APTs are very precise and intelligent. Perform specific
attacks on specific targets, and so differs from traditional forms of hacking. APT is precisely focused on
specific targets, according to the knowledge of the environment and selects appropriate types of attacks.
Therefore, it is very difficult to detect APT attacks. This article describes the methods and procedures APT
attacks, analysed and proposes solutions to detect these threats using honeypots system.
ISBN: 978-960-474-316-2 25
Recent Advances in Automatic Control, Information and Communications
ISBN: 978-960-474-316-2 26
Recent Advances in Automatic Control, Information and Communications
interaction honeypots and Low-interaction system. Therefore, this solution we extended the
honeypots.[5] agent who directs the attacker to the system
Two or more honeypots on a network form a honeypots. As these types of attacks simulate the
honeynet. Typically, a honeynet is used for behaviour of users, the attacker slip agendas and
monitoring a larger and/or more diverse network in users little trap. The essence trap lies in the
which one honeypot may not be sufficient. difference between continuous user behaviour and
Honeynets and honeypots are usually implemented bot. The user of the system is using the agent set a
as parts of larger network intrusion detection trap. The average user is hidden at first sight, or not
systems. A honeyfarm is a centralized collection of interesting for his work. For example, a typical user
honeypots and analysis tools ignores file system, various TMP directories, and
For detection system using APT with High- the like. Bot trying to do the contrary, collecting
interaction honeypots, Low-interaction honeypots information about invaded system, it searches every
and Honeypot on production systems. corner of systems. This is the stage where they come
onto the scene Honeypot systems that offer
High-interaction honeypots - Honeypot with a high interesting information for bots. The next chapter
degree of interaction shows a complete real system, will present all the steps of how the system works.
with all services and functions. Unfortunately, this
method of implementation allows the attack the 3.1. Step-by-Step Description
whole system, including the honeypot.[7]
ISBN: 978-960-474-316-2 27
Recent Advances in Automatic Control, Information and Communications
ISBN: 978-960-474-316-2 28
Recent Advances in Automatic Control, Information and Communications
performance and increase the efficiency of detection Migrating users to a cloud environment with thin
of the attack. clients may be a remedy, though cloud solutions
Function 4 currently face their own challenges.[9]
By intercepting attacks on honeypots can be Simulation threats through penetration testing and
analysed for the attack and using the information test exercises are good grounds for the creation of
collected we can better secure vulnerabilities of effective security strategies. Without a thorough
systems. understanding of the threats and good security
Function 5 strategy, security spending will be ineffective and an
After analysing captured on honeypots can inefficient.
determine which accounts were compromised, then
you can only block the system. We do not exclude References:
the operation of the whole system, just fix the [1] Advanced Persistent Threats (APT): What's an
compromised section. Saving considerable financial APT? A Brief Definition. DAMBALLA.
resources. [online]. 2010 [accessed on 2013-05-11].
Function 6 Available at:
Basic setup honeypots without an agent does not https://www.damballa.com/knowledge/advance
have any additional requirements (software or d-persistent-threats.php
hardware) to the user. Users do not even know about [2] APT1 Exposing One of China’s Cyber
this defence system. This solution is for him Espionage Units. [online]. p. 74 [accessed on.
invisible, which is the case of standard detection 2013-05-11]. Available at:
systems, the exact opposite. http://www.mandiant.com
Function 7 [3] COMMAND FIVE PTY LTD. Advanced
Possibility of detection of attacks on mobile devices, Persistent Threats: A Decade in Review.
which are beyond the control of the administrator [online]. 2011, p. 13 [accessed on 2013-05-11].
network segment. Detects attacks that are not Available at :
specifically targeted. http://www.commandfive.com/papers/C5_APT
_ADecadeInReview.pdf
Detection solution using honeypots is unnecessarily [4] DELL SECUREWORKS. Lifecycle of the
expensive and complicated as most systems to Advanced Persistent Threat. [online]. 2012, p.
detect attacks. Is the use of standard techniques and 16 [cit. 2013-05-11]. Available at:
instruments. To detect APT use their own http://go.secureworks.com/advancedthreats
shortcomings in system APT. [5] Honeypot Background. PROVOS, Niels.
Honeypot Background [online]. [accessed on
2013-05-11]. Available at:
4 Conclusion http://www.honeyd.org/background.php
APT attackers will always have an interest in your
[6] SPITZNER, Lance. Honeypots tracking
data. They are highly adaptable and monitor
hackers. Boston: Addison-Wesley, 2003. ISBN
deficiencies in the security of your systems. If they
0-321-10895-7.
are able to penetrate the defence can monitor your
[7] SPITZNER, Lance. Honeypots: Definitions and
systems and collect data. This data is then used to
Value of Honeypots. Virtual honeypots: from
infiltrate into other systems. The information
botnet tracking to intrusion dedction [online].
obtained could be used for business meetings, and
Upper Saddle River: Addison-Wesley, 2008
can have economic and strategic implications.
[accessed on 2013-05-11].
Analysis of incidents will help us improve our
[8] TREND MICRO. Targeted Attack Entry Points:
infrastructure and can focus on fixing
Are Your Business Communications Secure?.
vulnerabilities. We can then better focus on the
[online]. 2012, p. 5 [accessed on 2013-05-11].
monitoring and audit of specific systems. Planning
[9] SARGA, Libor. Is it Going to Rain From the
these strategies forward, it will be much harder for
Cloud? Challenges of Ubiquitous Computing
attackers to infiltrate systems and obliterate his
Models, Proceedings 8th International Bata
tracks. Maintenance IT environment, effective patch
Conference for Ph.D. students and Young
management are important steps to eliminate
Researchers, 19th April 2012, Zlín, Czech
opportunities for initial penetrations. With increased
Republic.
awareness of users can mitigate attempts by social
engineering. Removing local admin rights to users,
we can reduce the risk of privilege escalation.
ISBN: 978-960-474-316-2 29