To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads.

SS'08: Proceedings of the 17th conference on Security symposium(2008)

引用 15|浏览104
暂无评分
摘要
We present an automated, scalable, method for crafting dynamic responses to real-time network requests. Specifically, we provide a flexible technique based on natural language processing and string alignment techniques for intelligently interacting with protocols trained directly from raw network traffic. We demonstrate the utility of our approach by creating a low-interaction web-based honeypot capable of luring attacks from search worms targeting hundreds of different web applications. In just over two months, we witnessed over 368, 000 attacks from more than 5, 600 botnets targeting several hundred distinct webapps. The observed attacks included several exploits detected the same day the vulnerabilities were publicly disclosed. Our analysis of the payloads of these attacks reveals the state of the art in search-worm based botnets, packed with surprisingly modular and diverse functionality.
更多
查看译文
关键词
raw network traffic,real-time network request,different web application,diverse functionality,dynamic response,flexible technique,hundred distinct webapps,natural language processing,observed attack,search worm,malicious payload,natural language approach
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要