<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Article</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.1145/2498328.2500094</article-id>
      <title-group>
        <article-title>Hiding Computer Network Proactive Security Tools Unmasking Features</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Roman V. Maximov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergey P. Sokolovsky</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alexey L. Gavrilov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Shtemenko Krasnodar Higher Military School Krasnodar</institution>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2013</year>
      </pub-date>
      <volume>44</volume>
      <issue>2</issue>
      <fpage>88</fpage>
      <lpage>92</lpage>
      <abstract>
        <p>-Passive and proactive network security tools, based on cyber deception technologies, become more and more popular among classic tools. Using such tools gives an opportunity to prevent network attacks on the very beginning - at intelligence gathering stage. In this work we research one of these deceptive tools - a network tarpit. Based on LaBrea taprit, we investigate some fingerprints of its algorithms, that may lead to tarpit detecting and lowering overall security level. We used an open source detection tool Degreaser to find LaBrea's unmasking features, classify them and calculate their influence on the possibility of tarpit discovering. Our main goal was to provide methods to improve network tarpit obscuring capabilities, ridding of revealed unmasking features. These methods were later implemented as modules and integrated in our network tarpit called NetHole, that uses LaBrea as prototype and has no revealed shortcomings. The efficiency of modifications made was then tested in a set of tests with the same detection tool Degreaser.</p>
      </abstract>
      <kwd-group>
        <kwd>information security</kwd>
        <kwd>proactive defence</kwd>
        <kwd>network tarpit</kwd>
        <kwd>network security tools</kwd>
        <kwd>unmasking features</kwd>
        <kwd>cyber deception</kwd>
        <kwd>network intelligence gathering</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>INTRODUCTION</p>
      <p>
        Large part of modern network attacks is being conducted for
intelligence gathering issues, to reveal the topology of the
network being attacked and security tools being used in this
network [
        <xref ref-type="bibr" rid="ref1 ref2">1-3</xref>
        ]. Automated scanning tools are used in such
attacks with high possibility.
      </p>
      <p>
        Among other security tools there is a subclass based on
deception tactics [
        <xref ref-type="bibr" rid="ref4 ref5 ref6 ref7">4-7</xref>
        ]. Its main idea is not in increasing the
power or the amount of tools being used but to provide illusions
about network topology, thus slowing automated scanners and
confusing manual attackers. One of such applications is so
called honeypot [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15 ref16 ref17 ref18 ref19 ref20 ref21 ref8 ref9">8-21</xref>
        ]. More complex ways of network
deception include not only topology illusion and false
vulnerable hosts production but proactive defense in addition,
e.g. trapping connections with attacker, exhausting his
resources for maintaining connection state. A large number of
such trapped connections lead to slowdowning of automated
network scanners or even may cause an impossibility of overall
network interaction for the intruder caught by. These tools,
called network tarpits [
        <xref ref-type="bibr" rid="ref22 ref23">22, 23</xref>
        ], may work as standalone
deception applications or be included in firewall packets, e.g.
      </p>
    </sec>
    <sec id="sec-2">
      <title>Linux Netfilter Tarpit, part of Xtables-addons [24].</title>
      <p>II.</p>
      <p>COMPROMISING FEATURES</p>
      <p>
        One of the main advantages of deceptive network security
tools is their invisibility. Intruders, in their turn, actively create
new and modify existing tools for uncovering honeypots and
network tarpits, making them useless. Deceptive security tools
can be compromised by detecting their unique fingerprints,
which can be also called unmasking features. To achieve this,
attackers may use either common network traffic analyzers as
nmap, zenmap, ethereal, arping, tethreal, etc, or special tools,
developed for discovering proactive security tools [
        <xref ref-type="bibr" rid="ref25 ref26">25, 26</xref>
        ].
      </p>
      <p>
        We used one of such special tools, Degreaser [
        <xref ref-type="bibr" rid="ref25 ref26">25, 26</xref>
        ], for
testing LaBrea and informativity of its fingerprints and figured
out the following two types of unmasking features:
1) Unreliable features, that can’t be a total evidence of
tarpit presence. They are:
      </p>
      <p>a) A hardcoded MAC-address: LaBrea uses
(00:00:0F:FF:FF:FF)16 address regardless of physical address of
network adapter it works on. Network tarpits are often used
against threats outside LAN, where layer-2 address cannot be
seen. Moreover, multiply IP-addresses can be assigned for
single network interface.</p>
    </sec>
    <sec id="sec-3">
      <title>b) Opened TCP ports: LaBrea answers to requests to all</title>
      <p>TCP-ports of fake host, resulting in all TCP-ports to seem
opened. There are 65536 possible ports on every host and it
takes 216 requests per host to check every port on it. Such
scanning cost is too high.</p>
      <p>c) Delayed response: There is a time delay between
ARP-request and response in LaBrea promiscuous mode. It’s
also a secondary fingerprint, because there always can be
interferences causing such delays.</p>
      <p>2) Discriminating features, which lead to reliable tarpit
detection. They are:</p>
      <p>d) TCP window size: Fundamental feature of tarpit-like
host is manipulation with TCP-window size. Default window
size used by LaBrea is 10 bytes. This value is configurable, but
only once before running the tarpit. Small size of TCP window
is the first sign of tarpit presence.</p>
      <p>e) TCP options: TCP options can be used by hosts to
negotiate additional functionality. Typically, these options are
set by operating systems during establishing TCP connection.
LaBrea establishes its own TCP sessions, bypassing system
level, so it has to manage TCP options itself, but it is not
implemented. Ignoring TCP options is a second significant
fingerprint of LaBrea presence.</p>
      <p>So, there should be a balance between effectiveness of
network protection tools and possibility of them to be
discovered using their unmasking features. The main goal of
our work is to find that balance, developing methods to decrease
the level of informativity of network tarpits’ unmasking
features.</p>
      <p>III.</p>
      <p>NETHOLE</p>
      <p>We investigated Degreaser source code to find out the
fingerprints it searches for and created NetHole, that has no
unmasking features listed above, using LaBrea as prototype.</p>
      <p>The first method to lower the possibility of uncovering
network tarpit being used is in the following.</p>
    </sec>
    <sec id="sec-4">
      <title>A. Address space</title>
      <p>The set of available IP addresses is divided preliminarly into
subsets of authorized and used (connected) addresses of
network devices, authorized and temporarily unused network
addresses, the rest of set is marked as forbidden to be used by
network tarpit (Table I). The main idea of this method is to
increase the functioning realism of protected network.</p>
      <p>Dividing all IP addresses in such set will not cause a
situation of a network, where every address is available like a
false host, thus lowering the possibility of used network tarpit
being revealed. In addition, all attempts to establish connection
with hosts with IP addresses from forbidden set can be
identified as network topology scanning or attacks themselves.</p>
    </sec>
    <sec id="sec-5">
      <title>B. Randomizing MAC address</title>
      <p>A hardcoded MAC address used by LaBrea (fig. 1) is a clear
network tarpit fingerprint. MAC address is a unique
6-bytes number used for identification of Ethernet frames
sender and receiver that is set by the manufacturer of network
adapter.
be:97:a6:1c:2a:ef
Router
d4:e2:da:95:eb:3f
Router</p>
      <p>Broadcast
Router
Broadcast
Router
Broadcast</p>
      <p>Router</p>
      <p>To hide this fingerprint, we used random MAC addresses for
every fake host. We suggest 3 different options for a physical
addresses generator:</p>
    </sec>
    <sec id="sec-6">
      <title>1) Fully random MAC address: First option supposes</title>
      <p>generating completely random MAC address for every fake
host. To start with, we make an array of physical addresses of
currently active local network devices. Then, we generate
random sequence of hexadecimal numbers of size J, where
J is an amount of false hosts needed. To avoid the situation with
duplicate MAC adresses in one network segment, we need to
check whether every generated address is already in use by any
of real network devices. This address must not also be null
(00:00:00:00:00:00)16 or broadcast (ff:ff:ff:ff:ff:ff)16. While at
least one of these conditions is true, address will be regenerated
and then checked again. After that we align every i-th MAC
address with a j-th IP address of false host.</p>
      <p>The general algorithm of network tarpit with this
modification is described next. When ARP request to any
i-th IP address from given set is received, and if this IP address
is from temporarily unused addresses subset, response packet is
generated with TCP window size of 10 bytes and the aligned
jth MAC address in TCP header. This packet is send then to initial
sender on behalf of fake host.</p>
      <p>The described method was implemented in NetHole tarpit,
its effectiveness was tested in a series of tests, the main purpose
of which was to compare the discovering rate of LaBrea and
NetHole. To identify the network tarpit, i.e. the unmasking
feature of used security tool, we analyzed the intercepted ARP
packets with Wireshark. Table (II) represents the dump of ARP
protocol. The response on request “What MAC address does the
host with i-th IP address have?” is “The i-th IP address is set to
the host with j-th MAC address”, where j-th MAC address is
randomly generated.</p>
      <p>Partially random MAC-address: The second option of
described method suggests using a database with unique vendors
MAC octets (table III). The three upper octets of generating
MAC address are got from this database, the rest remain random,
as described in the first option. In order the imitating network to
seem more realistic, the vendor is chosen randomly every time.
Using this option leads to resulting false network to contain
devices made by real companies.</p>
    </sec>
    <sec id="sec-7">
      <title>2) Partially random MAC-address with real percentage</title>
      <p>ratio: The third option assumes preliminary ARP-scanning of
protected network in order to identify vendors of the local
devices by their MAC-addresses using the database described
above. It gives us a percentage ratio of used network devices,
using which we can imitate the most true-to-life false network.</p>
    </sec>
    <sec id="sec-8">
      <title>C. Implementing TCP-options</title>
      <p>The LaBrea never adds TCP options in headers of generated
response packets. To improve believability of answers being
sent, we decided to add the TCP option support. This feature
reads all options from incoming request packet and copies them
into the response packet, excluding “TCP Timestamp” option.
This option contains two 4-byte fields with timestamps. The
«Timestamp Value» (Tsval) field contains the packet sender’s
current value of timestamp. Firstly, it’s copied to «Timestamp
Echo Reply» (Tsecr) field and then the current system uptime
value is written in it.</p>
      <p>We used Degreaser to test this feature. While scanning,
Degreaser, among other tests, checks presence of any TCP
options in response packets. Table (IV) contains the output of
network scanning with LaBrea running in it.</p>
      <p>Degreaser identifies scanned hosts as network tarpits. In the
“TCP options” column found options are given. As stated at
table (IV), all hosts which are considered to be the “LaBrea
tarpit” have no TCP-options. Table (V) contains the results of
network testing with NetHole working in it The “TCP options”
column now contains Maximum Segment Size (M), Windows</p>
    </sec>
    <sec id="sec-9">
      <title>Scale (W), Selective Acknowledgement (S) and Timestamp (T)</title>
      <p>options. Degreaser cannot discover that all these hosts are held
by network tarpit.</p>
    </sec>
    <sec id="sec-10">
      <title>D. Random TCP-window size</title>
      <p>Network tarpits use TCP flow control to catch attackers by
changing the TCP window size, so it can be attributed to other
uncovering features. LaBrea sets TCP window size to 10 bytes
by default. The Degreaser’s algorithm checks this parameter
after checking TCP options, and if it is less than control value,
the host is considered to be a potential tarpit.</p>
      <p>IP Address
─
SA
─
SA
SA
─
─
SA
─
─
─
─
─
─
─
─</p>
      <p>In NetHole we use a small (up to 255 bytes) but random
TCP window size. It may be a result of additional traffic
received by tarpit, but it hides the unmasking fingerprint at the
same time. On the fragment of TCP dump below the randomly
generated window size of 195 bytes is highlighted.</p>
      <p>Source Port: 22
Destination Port: 48414
[Stream index: 5]
[TCP Segment Len: 0]</p>
      <p>Sequence number: 0 (relative sequence
number)</p>
      <p>Acknowledgment number: 1 (relative ack
number)</p>
      <p>Header Length: 20 bytes
Flags: 0x012 (SYN, ACK)
Window size value: 195
[Calculated window size: 195]
[SEQ/ACK analysis]
No response
No response
Degreaser scanning output is shown in table VI.</p>
      <p>The main purpose of network tarpits is to hang the network
session with attacker as long as possible. LaBrea ignores all
data packets after TCP session is established, compromising
itself. Degreaser exploits this feature, sending a TCP packet
with random data, which size is “TCP window size – 1”, and
waits for response. If there is no response, currently scanned
host is considered to be a tarpit. In order to hide this feature, we
implemented a module for sending confirmation tickets after
receiving any packet with data. The idea is to send a TCP-ACK
packet with adjusted window size in response to TCP packet
with PUSH flag.</p>
      <p>The example of network interaction between Degreaser
(with IP address 212.193.1.10) and NetHole (with IP address
212.193.1.28) could be seen in Table (VII). There are five TCP
packets, three of them were used for connection establishing,
the 4th is a 9-bytes data packet and the 5th is a TCP-ACK packet
sent as a confirmation ticket.</p>
      <p>SA
─
─
─
─
─
SA
SA</p>
      <p>As listed in table (VIII), there are no TCP options in all
responses, TCP window size is 10 bytes, that is less than default
minimal value for Degreaser, but all these hosts are not
considered to be real hosts, neither common network tarpit, nor
LaBrea tarpit especially, because of send TCP-ACK
confirmation packets.</p>
      <p>Using the tests described above we confirmed that using
the developed modules leads to increasing the effectiveness
of network tarpit and its stealthiness level through decreasing
the possibility of its uncovering and identification by
intruders.</p>
      <p>Available:</p>
      <p>git</p>
      <p>2014.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Hayatle</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Youssef</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Otrok</surname>
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Dempster-Shafer Evidence</surname>
          </string-name>
          <article-title>Combining for Anti-Honeypot Technologies</article-title>
          .
          <source>Inf. Sec. J.: A Global Perspective</source>
          <volume>21</volume>
          ,
          <issue>6</issue>
          (
          <year>January 2012</year>
          ),
          <year>2012</year>
          , pp.
          <fpage>306</fpage>
          -
          <lpage>316</lpage>
          . DOI:
          <volume>10</volume>
          .1080/19393555.
          <year>2012</year>
          .
          <volume>738375</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Laurén</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leppänen</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rauti</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Uitto J. A</surname>
          </string-name>
          <article-title>Survey on Anti-honeypot and Anti-introspection Methods</article-title>
          .
          <source>Recent Advances in Information Systems and Technologies -</source>
          Volume
          <volume>2</volume>
          , WorldCIST'17,
          <string-name>
            <surname>Porto</surname>
            <given-names>Santo Island</given-names>
          </string-name>
          , Madeira, Portugal,
          <source>April 11-13</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>125</fpage>
          -
          <lpage>134</lpage>
          . DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -56538-5_
          <fpage>13</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>Markov A.S.</given-names>
            ,
            <surname>Tsirlov</surname>
          </string-name>
          <string-name>
            <surname>V.L.</surname>
          </string-name>
          <article-title>Guidelines for Cybersecurity in the Context of ISO 27032</article-title>
          ,
          <string-name>
            <surname>Voprosy</surname>
            <given-names>kiberbezopasnosti</given-names>
          </string-name>
          [Cybersecurity issues],
          <year>2014</year>
          , No
          <volume>1</volume>
          (
          <issue>2</issue>
          ). P.
          <volume>28</volume>
          -
          <fpage>35</fpage>
          . DOI:
          <volume>10</volume>
          .21681/
          <fpage>2311</fpage>
          -3456-2014-1-
          <fpage>28</fpage>
          -35.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Achleitner</surname>
            <given-names>S.</given-names>
          </string-name>
          , La Porta T.,
          <string-name>
            <surname>McDaniel</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sugrim</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krishnamurthy</surname>
            <given-names>S.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chadha</surname>
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Cyber</surname>
          </string-name>
          <article-title>Deception: Virtual Networks to Defend Insider Reconnaissance</article-title>
          .
          <source>In Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats (MIST '16)</source>
          . ACM, New York, NY, USA,
          <year>2016</year>
          , pp.
          <fpage>57</fpage>
          -
          <lpage>68</lpage>
          . DOI:
          <volume>10</volume>
          .1145/2995959.2995962.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>De Gaspari F</surname>
          </string-name>
          .,
          <string-name>
            <surname>Jajodia</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mancini</surname>
            <given-names>L.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Panico</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>AHEAD: A New Architecture for Active Defense</article-title>
          .
          <source>In Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense (SafeConfig '16)</source>
          . ACM, New York, NY, USA,
          <year>2016</year>
          , pp.
          <fpage>11</fpage>
          -
          <lpage>16</lpage>
          . DOI:
          <volume>10</volume>
          .1145/2994475.2994481.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Shaw</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Arrowood</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kvasnicka</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Taylor S</surname>
          </string-name>
          .,
          <string-name>
            <surname>Cook</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hale</surname>
            <given-names>J. POSTER</given-names>
          </string-name>
          :
          <article-title>Evaluating Reflective Deception as a Malware Mitigation Strategy</article-title>
          .
          <source>In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS '17)</source>
          . ACM, New York, NY, USA,
          <year>2017</year>
          , pp.
          <fpage>2575</fpage>
          -
          <lpage>2577</lpage>
          . DOI:
          <volume>10</volume>
          .1145/3133956.3138833.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Almeshekah</surname>
            <given-names>M.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Spafford</surname>
            <given-names>E.H.</given-names>
          </string-name>
          <string-name>
            <surname>Planning</surname>
          </string-name>
          and
          <article-title>Integrating Deception into Computer Security Defenses</article-title>
          .
          <source>In Proceedings of the 2014 New Security Paradigms Workshop (NSPW '14)</source>
          . ACM, New York, NY, USA,
          <year>2014</year>
          , pp.
          <fpage>127</fpage>
          -
          <lpage>138</lpage>
          . DOI:
          <volume>10</volume>
          .1145/2683467.2683482.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Du Z.</given-names>
            ,
            <surname>Fan</surname>
          </string-name>
          <string-name>
            <given-names>W.</given-names>
            ,
            <surname>Fernández</surname>
          </string-name>
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Villagrá</surname>
          </string-name>
          <string-name>
            <surname>V.A.</surname>
          </string-name>
          <article-title>Enabling an Anatomic View to Investigate Honeypot Systems: A Survey</article-title>
          .
          <article-title>November 2017</article-title>
          .
          <source>IEEE Systems Journal 11/2017</source>
          , pp (
          <volume>99</volume>
          ):
          <fpage>1</fpage>
          -
          <lpage>14</lpage>
          . DOI:
          <volume>10</volume>
          .1109/JSYST.
          <year>2017</year>
          .
          <volume>2762161</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Keil</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nawrocki</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schmidt</surname>
            ,
            <given-names>T.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schönfelder</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wählisch</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>A Survey on Honeypot Software and Data Analysis</article-title>
          .
          <source>arXiv.org</source>
          ,
          <year>2016</year>
          , vol.
          <volume>10</volume>
          , pp.
          <fpage>63</fpage>
          -
          <lpage>75</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Sokol</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Míšek</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Husák</surname>
            <given-names>M. Honeypots</given-names>
          </string-name>
          <article-title>and honeynets: issues of privacy</article-title>
          .
          <source>EURASIP Journal on Information Security</source>
          .
          <year>2017</year>
          ,
          <volume>1</volume>
          ,
          <string-name>
            <surname>Article 57</surname>
          </string-name>
          (
          <year>December 2017</year>
          ),
          <article-title>9 pages</article-title>
          .
          <source>DOI: 10.1186/s13635-017-0057-4.</source>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Nawrocki</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wahlisch</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schmidt</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Keil</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schonfelder</surname>
            <given-names>J</given-names>
          </string-name>
          .
          <source>A Survey on Honeypot Software and Data Analysis</source>
          .
          <year>2016</year>
          . CoRR, abs/1608.06249.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Olagunju</surname>
            <given-names>A.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Samu</surname>
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>In</surname>
          </string-name>
          <article-title>Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention</article-title>
          .
          <source>In Proceedings of the 5th Annual Conference on Research in Information Technology (RIIT '16)</source>
          . ACM, New York, NY, USA,
          <year>2016</year>
          , pp.
          <fpage>41</fpage>
          -
          <lpage>46</lpage>
          . DOI:
          <volume>10</volume>
          .1145/2978178.2978184.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Han</surname>
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Doupé</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ahn</surname>
            <given-names>G.</given-names>
          </string-name>
          <article-title>HoneyMix: Toward SDN-based Intelligent Honeynet</article-title>
          .
          <source>In Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks &amp; Network Function Virtualization (SDN-NFV Security '16)</source>
          . ACM, New York, NY, USA,
          <year>2016</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . DOI:
          <volume>10</volume>
          .1145/2876019.2876022.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Guarnizo</surname>
            <given-names>J.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tambe</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bhunia</surname>
            <given-names>S.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ochoa</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tippenhauer</surname>
            <given-names>N.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shabtai</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Elovici</surname>
            <given-names>Y. SIPHON</given-names>
          </string-name>
          :
          <article-title>Towards Scalable High-Interaction Physical Honeypots</article-title>
          .
          <source>In Proceedings of the 3rd ACM Workshop on CyberPhysical System Security (CPSS '17)</source>
          . ACM, New York, NY, USA,
          <year>2017</year>
          , pp
          <fpage>57</fpage>
          -
          <lpage>68</lpage>
          . DOI:
          <volume>10</volume>
          .1145/3055186.3055192.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Tiwari</surname>
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Jain</surname>
          </string-name>
          <article-title>A. Improving network security and design using honeypots</article-title>
          .
          <source>In Proceedings of the CUBE International Information Technology Conference (CUBE '12)</source>
          . ACM, New York, NY, USA,
          <year>2012</year>
          , pp.
          <fpage>847</fpage>
          -
          <lpage>852</lpage>
          . DOI:
          <volume>10</volume>
          .1145/2381716.2381875.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Andrew</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chi</surname>
            <given-names>H.</given-names>
          </string-name>
          <article-title>An empirical study of botnets on university networks using low-interaction honeypots</article-title>
          .
          <source>In Proceedings of the 51st ACM</source>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Pisarčík</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sokol</surname>
            <given-names>P</given-names>
          </string-name>
          .
          <article-title>Framework for distributed virtual honeynets</article-title>
          .
          <source>In Proceedings of the 7th International Conference on Security of Information and Networks (SIN '14)</source>
          . ACM, New York, NY, USA,
          <year>2014</year>
          , Pages
          <issue>324</issue>
          , 6 pages.
          <source>DOI: 10.1145/2659651</source>
          .2659685.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Laurén</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rauti</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leppänen</surname>
            <given-names>V.</given-names>
          </string-name>
          <article-title>An interface diversified honeypot for malware analysis</article-title>
          .
          <source>In Proccedings of the 10th European Conference on Software Architecture Workshops (ECSAW '16)</source>
          . ACM, New York, NY, USA,
          <year>2016</year>
          , Article
          <issue>29</issue>
          , 6 pages.
          <source>DOI: 10.1145/2993412</source>
          .2993417.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Saud</surname>
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Islam</surname>
            <given-names>M.H.</given-names>
          </string-name>
          <article-title>Towards proactive detection of advanced persistent threat (APT) attacks using honeypots</article-title>
          .
          <source>In Proceedings of the 8th International Conference on Security of Information and Networks (SIN '15)</source>
          . ACM, New York, NY, USA,
          <year>2015</year>
          , pp.
          <fpage>154</fpage>
          -
          <lpage>157</lpage>
          . DOI:
          <volume>10</volume>
          .1145/2799979.2800042.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Borkar</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Salunke</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barabde</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karlekar</surname>
            <given-names>N. P.</given-names>
          </string-name>
          <string-name>
            <surname>Honeypot</surname>
          </string-name>
          <article-title>: a survey of technologies, tools and deployment</article-title>
          .
          <source>In Proceedings of the International Conference &amp; Workshop on Emerging Trends in Technology (ICWET '11)</source>
          . ACM, New York, NY, USA,
          <year>2011</year>
          , pp.
          <fpage>1357</fpage>
          -
          <lpage>1357</lpage>
          . DOI:
          <volume>10</volume>
          .1145/1980022.1980327.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Shmatova</surname>
            <given-names>E.</given-names>
          </string-name>
          <article-title>The Choice of Strategy for the Spurious Information System on the Basis of the Game Theory Model</article-title>
          .
          <source>Voprosy kiberbezopasnosti [Cybersecurity issues]</source>
          ,
          <source>2015. No</source>
          <volume>5</volume>
          (
          <issue>13</issue>
          ). P.
          <volume>36</volume>
          -
          <fpage>40</fpage>
          . DOI:
          <volume>10</volume>
          .21681/
          <fpage>2311</fpage>
          - 3456-2015-5-
          <fpage>36</fpage>
          -40.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Liston</surname>
            <given-names>T.</given-names>
          </string-name>
          <article-title>LaBrea: «sticky» Honeypot and IDS</article-title>
          . [Online]. Available: http://labrea.sourceforge.net/labrea-info.html.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Liston</surname>
            <given-names>T.</given-names>
          </string-name>
          «
          <article-title>LaBrea»</article-title>
          . http://labrea.sourceforge.net/labrea.1.txt.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Hopkins</surname>
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>TARPIT-iptables</surname>
            <given-names>TARPIT</given-names>
          </string-name>
          target. [Online]. Available: http: //www.netfilter.org/projects/patch-o-matic/pom-external.html.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Alt</surname>
          </string-name>
          . L. Degreaser https://github.com/lancealt/degreaser.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Alt</surname>
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beverly</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dainotti</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>Uncovering network tarpits with degreaser</article-title>
          .
          <source>In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC '14)</source>
          . ACM, New York, NY, USA,
          <year>2014</year>
          , pp.
          <fpage>156</fpage>
          -
          <lpage>165</lpage>
          . DOI:
          <volume>10</volume>
          .1145/2664243.2664285.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>