=Paper= {{Paper |id=Vol-2081/paper19 |storemode=property |title=Hiding Computer Network Proactive Security Tools Unmasking Features |pdfUrl=https://ceur-ws.org/Vol-2081/paper19.pdf |volume=Vol-2081 |authors=Roman V. Maximov,Sergey P. Sokolovsky,Alexey L. Gavrilov }} ==Hiding Computer Network Proactive Security Tools Unmasking Features== https://ceur-ws.org/Vol-2081/paper19.pdf
  Hiding Computer Network Proactive Security Tools
               Unmasking Features
                                Roman V. Maximov, Sergey P. Sokolovsky, Alexey L. Gavrilov
                                           Shtemenko Krasnodar Higher Military School
                                                      Krasnodar, Russia
                                     rvmaxim@yandex.ru; ssp.vrn@mail.ru; aleks02.94@mail.ru



    Abstract—Passive and proactive network security tools, based
on cyber deception technologies, become more and more popular                                 II.   COMPROMISING FEATURES
among classic tools. Using such tools gives an opportunity to                   One of the main advantages of deceptive network security
prevent network attacks on the very beginning – at intelligence
                                                                            tools is their invisibility. Intruders, in their turn, actively create
gathering stage. In this work we research one of these deceptive
tools – a network tarpit. Based on LaBrea taprit, we investigate
                                                                            new and modify existing tools for uncovering honeypots and
some fingerprints of its algorithms, that may lead to tarpit                network tarpits, making them useless. Deceptive security tools
detecting and lowering overall security level. We used an open              can be compromised by detecting their unique fingerprints,
source detection tool Degreaser to find LaBrea’s unmasking                  which can be also called unmasking features. To achieve this,
features, classify them and calculate their influence on the                attackers may use either common network traffic analyzers as
possibility of tarpit discovering. Our main goal was to provide             nmap, zenmap, ethereal, arping, tethreal, etc, or special tools,
methods to improve network tarpit obscuring capabilities, ridding           developed for discovering proactive security tools [25, 26].
of revealed unmasking features. These methods were later                        We used one of such special tools, Degreaser [25, 26], for
implemented as modules and integrated in our network tarpit
                                                                            testing LaBrea and informativity of its fingerprints and figured
called NetHole, that uses LaBrea as prototype and has no revealed
shortcomings. The efficiency of modifications made was then
                                                                            out the following two types of unmasking features:
tested in a set of tests with the same detection tool Degreaser.                 1) Unreliable features, that can’t be a total evidence of
                                                                            tarpit presence. They are:
    Keywords—information security; proactive defence; network                       a) A     hardcoded       MAC-address:        LaBrea       uses
tarpit; network security tools; unmasking features; cyber deception;        (00:00:0F:FF:FF:FF)16 address regardless of physical address of
network intelligence gathering                                              network adapter it works on. Network tarpits are often used
                       I.    INTRODUCTION                                   against threats outside LAN, where layer-2 address cannot be
                                                                            seen. Moreover, multiply IP-addresses can be assigned for
   Large part of modern network attacks is being conducted for              single network interface.
intelligence gathering issues, to reveal the topology of the
network being attacked and security tools being used in this                        b) Opened TCP ports: LaBrea answers to requests to all
                                                                            TCP-ports of fake host, resulting in all TCP-ports to seem
network [1-3]. Automated scanning tools are used in such
                                                                            opened. There are 65536 possible ports on every host and it
attacks with high possibility.
                                                                            takes 216 requests per host to check every port on it. Such
   Among other security tools there is a subclass based on
                                                                            scanning cost is too high.
deception tactics [4-7]. Its main idea is not in increasing the
power or the amount of tools being used but to provide illusions                    c) Delayed response: There is a time delay between
about network topology, thus slowing automated scanners and                 ARP-request and response in LaBrea promiscuous mode. It’s
confusing manual attackers. One of such applications is so                  also a secondary fingerprint, because there always can be
called honeypot [8-21]. More complex ways of network                        interferences causing such delays.
deception include not only topology illusion and false                           2) Discriminating features, which lead to reliable tarpit
vulnerable hosts production but proactive defense in addition,              detection. They are:
e.g. trapping connections with attacker, exhausting his                             d) TCP window size: Fundamental feature of tarpit-like
resources for maintaining connection state. A large number of               host is manipulation with TCP-window size. Default window
such trapped connections lead to slowdowning of automated                   size used by LaBrea is 10 bytes. This value is configurable, but
network scanners or even may cause an impossibility of overall              only once before running the tarpit. Small size of TCP window
network interaction for the intruder caught by. These tools,                is the first sign of tarpit presence.
called network tarpits [22, 23], may work as standalone                          e) TCP options: TCP options can be used by hosts to
deception applications or be included in firewall packets, e.g.             negotiate additional functionality. Typically, these options are
Linux Netfilter Tarpit, part of Xtables-addons [24].                        set by operating systems during establishing TCP connection.
                                                                            LaBrea establishes its own TCP sessions, bypassing system
                                                                            level, so it has to manage TCP options itself, but it is not




                                                                       88
implemented. Ignoring TCP options is a second significant                           To hide this fingerprint, we used random MAC addresses for
fingerprint of LaBrea presence.                                                  every fake host. We suggest 3 different options for a physical
    So, there should be a balance between effectiveness of                       addresses generator:
network protection tools and possibility of them to be
                                                                                    1) Fully random MAC address: First option supposes
discovered using their unmasking features. The main goal of
                                                                                 generating completely random MAC address for every fake
our work is to find that balance, developing methods to decrease
                                                                                 host. To start with, we make an array of physical addresses of
the level of informativity of network tarpits’ unmasking
                                                                                 currently active local network devices. Then, we generate
features.
                                                                                 random sequence of hexadecimal numbers of size J, where
                             III.     NETHOLE                                    J is an amount of false hosts needed. To avoid the situation with
                                                                                 duplicate MAC adresses in one network segment, we need to
    We investigated Degreaser source code to find out the                        check whether every generated address is already in use by any
fingerprints it searches for and created NetHole, that has no                    of real network devices. This address must not also be null
unmasking features listed above, using LaBrea as prototype.                      (00:00:00:00:00:00)16 or broadcast (ff:ff:ff:ff:ff:ff)16. While at
   The first method to lower the possibility of uncovering                       least one of these conditions is true, address will be regenerated
network tarpit being used is in the following.                                   and then checked again. After that we align every i-th MAC
                                                                                 address with a j-th IP address of false host.
A. Address space
                                                                                      The general algorithm of network tarpit with this
    The set of available IP addresses is divided preliminarly into
                                                                                 modification is described next. When ARP request to any
subsets of authorized and used (connected) addresses of
                                                                                 i-th IP address from given set is received, and if this IP address
network devices, authorized and temporarily unused network
                                                                                 is from temporarily unused addresses subset, response packet is
addresses, the rest of set is marked as forbidden to be used by
                                                                                 generated with TCP window size of 10 bytes and the aligned j-
network tarpit (Table I). The main idea of this method is to
                                                                                 th MAC address in TCP header. This packet is send then to initial
increase the functioning realism of protected network.
                                                                                 sender on behalf of fake host.
    Dividing all IP addresses in such set will not cause a
situation of a network, where every address is available like a                       The described method was implemented in NetHole tarpit,
false host, thus lowering the possibility of used network tarpit                 its effectiveness was tested in a series of tests, the main purpose
being revealed. In addition, all attempts to establish connection                of which was to compare the discovering rate of LaBrea and
with hosts with IP addresses from forbidden set can be                           NetHole. To identify the network tarpit, i.e. the unmasking
identified as network topology scanning or attacks themselves.                   feature of used security tool, we analyzed the intercepted ARP
                                                                                 packets with Wireshark. Table (II) represents the dump of ARP
                TABLE I.            DIVIDING ADDRESS SPACE                       protocol. The response on request “What MAC address does the
                                                                                 host with i-th IP address have?” is “The i-th IP address is set to
                    The set of all available IP-addresses
                                                                                 the host with j-th MAC address”, where j-th MAC address is
          Authorized IP addresses subset                                         randomly generated.
                                                          Forbidden                   Partially random MAC-address: The second option of
    Used IP addresses                                 IP addresses subset
                            Temporarily unused                                   described method suggests using a database with unique vendors
   subset (real network
                            IP addresses subset
         devices)                                                                MAC octets (table III). The three upper octets of generating
                                                                                 MAC address are got from this database, the rest remain random,
                                                                                 as described in the first option. In order the imitating network to
                                                                                 seem more realistic, the vendor is chosen randomly every time.
B. Randomizing MAC address                                                       Using this option leads to resulting false network to contain
                                                                                 devices made by real companies.
   A hardcoded MAC address used by LaBrea (fig. 1) is a clear
network tarpit fingerprint. MAC address is a unique                                       TABLE II.     USING OF GENERATED MAC ADDRESSES
6-bytes number used for identification of Ethernet frames
sender and receiver that is set by the manufacturer of network                                                               Contents of ARP-
                                                                                             Sender          Receiver
                                                                                                                                   request
adapter.                                                                                                                  Who has 10.0.0.40?
                                                                                    Router                 Broadcast
                                                                                                                          Tell 10.0.0.100
                                                                                                                          10.0.0.40 is at
                                                                                    be:97:a6:1c:2a:ef      Router
                                                                                                                          be:97:a6:1c:2a:ef
                                                                                                                          Who has 10.0.0.41? Tell
                                                                                    Router                 Broadcast
                                                                                                                          10.0.0.100
Fig. 1. The only hardcoded MAC address used by LaBrea                                                                     10.0.0.41 is at
                                                                                    d4:e2:da:95:eb:3f      Router
                                                                                                                          d4:e2:da:95:eb:3f
                                                                                                                          Who has 10.0.0.42? Tell
                                                                                    Router                 Broadcast
                                                                                                                          10.0.0.100
                                                                                                                          10.0.0.42 is at
                                                                                    3e:8b:0b:d0:dd:ae      Router
                                                                                                                          3e:8b:0b:d0:dd:ae




                                                                            89
 TABLE III.     THE PART OF UNIQUE VENDORS MAC OCTETS DATABASE               TABLE IV.          THE NETWORK WITH LABREA SCANNING RESULTS

               MAC-address                    Vendor




                                                                                                                                    Window Size




                                                                                                                                                                                        TCP Options



                                                                                                                                                                                                              Scan Result
                                                                                                           Response




                                                                                                                                                              TCP Flags
                                                                                                            Time
      000142                    Cisco Systems, Inc                             IP Address
      00037F                    Atheros Communications, Inc

      000393                    Apple, Inc.
                                                                             212.193.1.210             0                            0                         ─                         ─             No response
      0004EA                    Hewlett Packard
                                                                             212.193.1.92              257762                       10                        SA                        ─             LaBrea
      0004E9                    Infiniswitch Corporation
                                                                             212.193.1.198             0                            0                         ─                         ─             No response
      000585                    Juniper
                                                                             212.193.1.105             81284                        10                        SA                        ─             LaBrea
      00059E                    Zinwell Corporation
                                                                             212.193.1.195             205014                       10                        SA                        ─             LaBrea

                                                                             212.193.1.121             0                            0                         ─                         ─             No response
  2) Partially random MAC-address with real percentage
ratio: The third option assumes preliminary ARP-scanning of                  212.193.1.251             0                            0                         ─                         ─             LaBrea
protected network in order to identify vendors of the local                  212.193.1.226             127510                       10                        SA                        ─             LaBrea
devices by their MAC-addresses using the database described
above. It gives us a percentage ratio of used network devices,
using which we can imitate the most true-to-life false network.             In NetHole we use a small (up to 255 bytes) but random
                                                                         TCP window size. It may be a result of additional traffic
C. Implementing TCP-options                                              received by tarpit, but it hides the unmasking fingerprint at the
    The LaBrea never adds TCP options in headers of generated            same time. On the fragment of TCP dump below the randomly
response packets. To improve believability of answers being              generated window size of 195 bytes is highlighted.
sent, we decided to add the TCP option support. This feature
                                                                           Source Port: 22
reads all options from incoming request packet and copies them             Destination Port: 48414
into the response packet, excluding “TCP Timestamp” option.                [Stream index: 5]
This option contains two 4-byte fields with timestamps. The                [TCP Segment Len: 0]
«Timestamp Value» (Tsval) field contains the packet sender’s               Sequence number: 0 (relative sequence
current value of timestamp. Firstly, it’s copied to «Timestamp           number)
Echo Reply» (Tsecr) field and then the current system uptime               Acknowledgment number: 1 (relative ack
value is written in it.                                                  number)
    We used Degreaser to test this feature. While scanning,                Header Length: 20 bytes
Degreaser, among other tests, checks presence of any TCP                   Flags: 0x012 (SYN, ACK)
options in response packets. Table (IV) contains the output of             Window size value: 195
                                                                           [Calculated window size: 195]
network scanning with LaBrea running in it.
                                                                           [SEQ/ACK analysis]
    Degreaser identifies scanned hosts as network tarpits. In the
“TCP options” column found options are given. As stated at                  TABLE V.            THE NETWORK WITH NETHOLE SCANNING RESULTS
table (IV), all hosts which are considered to be the “LaBrea
                                                                                                                      Window Size




tarpit” have no TCP-options. Table (V) contains the results of
                                                                                                                                                                          TCP Options




                                                                                                                                                                                                           Scan Result
                                                                                   IP Address




                                                                                                      Response




                                                                                                                                                  TCP Flags




network testing with NetHole working in it The “TCP options”
                                                                                                       Time




column now contains Maximum Segment Size (M), Windows
Scale (W), Selective Acknowledgement (S) and Timestamp (T)
options. Degreaser cannot discover that all these hosts are held
by network tarpit.                                                          212.193.1.49          136629              10                     SA                     MVST                              Real host

D. Random TCP-window size                                                   212.193.1.70          0                   0                           ─                       ─                           No response
    Network tarpits use TCP flow control to catch attackers by              212.193.1.144         99569               10                     SA                     MVST                              Real host
changing the TCP window size, so it can be attributed to other
uncovering features. LaBrea sets TCP window size to 10 bytes                212.193.1.125         0                   0                           ─                       ─                           No response
by default. The Degreaser’s algorithm checks this parameter                 212.193.1.196         0                   0                           ─                       ─                           No response
after checking TCP options, and if it is less than control value,
the host is considered to be a potential tarpit.                            212.193.1.233         0                   0                           ─                       ─                           No response

                                                                            212.193.1.88          227956              10                     SA                     MVST                              Real host

                                                                            212.193.1.140         0                   0                           ─                       ─                           No response




                                                                    90
Degreaser scanning output is shown in table VI.                                                                  TABLE VIII.            SCANNING RESULTS WITH APPLICATION LEVEL RESPONSES
                                                                                                                                                           IMPLEMENTED

  TABLE VI.            SCANNING RESULTS WITH RANDOMLY GENERATED TCP




                                                                                                                                                                  Window Size




                                                                                                                                                                                             TCP Options



                                                                                                                                                                                                                 Scan Result
                                 WINDOW SIZE




                                                                                                                           IP Address




                                                                                                                                                Response




                                                                                                                                                                                 TCP Flags
                                                                                                                                                 Time
                                              Window Size




                                                                        TCP Options



                                                                                             Scan Result
          IP Address




                              Response




                                                            TCP Flags
                               Time                                                                               212.193.1.193             103529            10                SA           ─             Real host

                                                                                                                  212.193.1.73              0                 0                  ─           ─             No response
   212.193.1.144          174390          178               SA          ─               Real host
                                                                                                                  212.193.1.47              0                 0                  ─           ─             No response
   212.193.1.195          149446          230               SA          ─               Real host
                                                                                                                  212.193.1.67              0                 0                  ─           ─             No response
   212.193.1.122          107480          201               SA          ─               Real host
                                                                                                                  212.193.1.87              207563            10                SA           ─             Real host
   212.193.1.141          128513          52                SA          ─               Real host
                                                                                                                  212.193.1.106             199462            10                SA           ─             Real host
   212.193.1.226          0               0                 ─           ─               No response
                                                                                                                  212.193.1.105             0                 0                  ─           ─             No response
   212.193.1.146          127476          126               SA          ─               Real host
                                                                                                                  212.193.1.172             0                 0                  ─           ─             No response
   212.193.1.230          2295501         196               SA          ─               Real host

   212.193.1.73           0               0                 ─           ─               No response                As listed in table (VIII), there are no TCP options in all
                                                                                                                responses, TCP window size is 10 bytes, that is less than default
                                                                                                                minimal value for Degreaser, but all these hosts are not
E. Application level responses
                                                                                                                considered to be real hosts, neither common network tarpit, nor
   The main purpose of network tarpits is to hang the network                                                   LaBrea tarpit especially, because of send TCP-ACK
session with attacker as long as possible. LaBrea ignores all                                                   confirmation packets.
data packets after TCP session is established, compromising
itself. Degreaser exploits this feature, sending a TCP packet                                                                                     IV.        CONCLUSION
with random data, which size is “TCP window size – 1”, and
waits for response. If there is no response, currently scanned                                                           Using the tests described above we confirmed that using
host is considered to be a tarpit. In order to hide this feature, we                                                  the developed modules leads to increasing the effectiveness
implemented a module for sending confirmation tickets after                                                           of network tarpit and its stealthiness level through decreasing
receiving any packet with data. The idea is to send a TCP-ACK                                                         the possibility of its uncovering and identification by
packet with adjusted window size in response to TCP packet                                                            intruders.
with PUSH flag.
   The example of network interaction between Degreaser
(with IP address 212.193.1.10) and NetHole (with IP address                                                                                                REFERENCES
212.193.1.28) could be seen in Table (VII). There are five TCP                                                  [1]    Hayatle O., Youssef A., Otrok H. Dempster-Shafer Evidence Combining
packets, three of them were used for connection establishing,                                                          for Anti-Honeypot Technologies. Inf. Sec. J.: A Global Perspective 21, 6
the 4th is a 9-bytes data packet and the 5th is a TCP-ACK packet                                                       (January         2012),      2012,         pp.      306-316.       DOI:
                                                                                                                       10.1080/19393555.2012.738375.
sent as a confirmation ticket.
                                                                                                                [2]    Laurén S., Leppänen V., Rauti S., Uitto J. A Survey on Anti-honeypot and
                                                                                                                       Anti-introspection Methods. Recent Advances in Information Systems
       TABLE VII.          IMITATION OF APPLICATION LEVEL RESPONSE
                                                                                                                       and Technologies - Volume 2, WorldCIST'17, Porto Santo Island,
                                                                                                                       Madeira, Portugal, April 11-13, 2017, pp. 125-134. DOI: 10.1007/978-3-
 Source                 Destination      Protocol                                     Contents                         319-56538-5_13.
                                                                  32622 – 80 [SYN]                              [3]    Markov A.S., Tsirlov V.L. Guidelines for Cybersecurity in the Context of
 212.193.1.10          212.193.1.10      TCP                                                                           ISO 27032, Voprosy kiberbezopasnosti [Cybersecurity issues], 2014, No
                                                                  Seq=0 Win=5840 Len=0
                                                                  80 - 32622 [SYN, ACK]                                1 (2). P. 28-35. DOI: 10.21681/2311-3456-2014-1-28-35.
 212.193.1.28          212.193.1.10      TCP                      Seq=0 Ack=1 Win=10                            [4]    Achleitner S., La Porta T., McDaniel P., Sugrim S., Krishnamurthy S.V.,
                                                                  Len=0                                                Chadha R. Cyber Deception: Virtual Networks to Defend Insider
                                                                  32622 – 80 [ACK]                                     Reconnaissance. In Proceedings of the 8th ACM CCS International
 212.193.1.10          212.193.1.10      TCP                      Seq=1 Ack=1 Win=5840                                 Workshop on Managing Insider Security Threats (MIST '16). ACM, New
                                                                  Len=0                                                York, NY, USA, 2016, pp. 57-68. DOI: 10.1145/2995959.2995962.
                                                                  32622 – 80 [ACK]                              [5]    De Gaspari F., Jajodia S., Mancini L.V., Panico A. AHEAD: A New
 212.193.1.10          212.193.1.10      TCP                      Seq=1 Ack=1 Win=5840                                 Architecture for Active Defense. In Proceedings of the 2016 ACM
                                                                  Len=9                                                Workshop on Automated Decision Making for Active Cyber Defense
                                                                  80 - 32622 [ACK]                                     (SafeConfig '16). ACM, New York, NY, USA, 2016, pp. 11-16. DOI:
 212.193.1.28          212.193.1.10      TCP                      Seq=1 Ack=1 Win=30                                   10.1145/2994475.2994481.
                                                                  Len=0                                         [6]    Shaw T., Arrowood J., Kvasnicka M., Taylor S., Cook K., Hale J.
                                                                                                                       POSTER: Evaluating Reflective Deception as a Malware Mitigation
                                                                                                                       Strategy. In Proceedings of the 2017 ACM SIGSAC Conference on




                                                                                                           91
     Computer and Communications Security (CCS '17). ACM, New York,                       Southeast Conference (ACMSE '13). ACM, New York, NY, USA, 2013,
     NY, USA, 2017, pp. 2575-2577. DOI: 10.1145/3133956.3138833.                          Article 44, 2 pages. DOI: 10.1145/2498328.2500094.
[7] Almeshekah M.H., Spafford E.H. Planning and Integrating Deception into           [17] Pisarčík P., Sokol P. Framework for distributed virtual honeynets. In
     Computer Security Defenses. In Proceedings of the 2014 New Security                  Proceedings of the 7th International Conference on Security of
     Paradigms Workshop (NSPW '14). ACM, New York, NY, USA, 2014,                         Information and Networks (SIN '14). ACM, New York, NY, USA, 2014,
     pp. 127-138. DOI: 10.1145/2683467.2683482.                                           Pages 324, 6 pages. DOI: 10.1145/2659651.2659685.
[8] Du Z., Fan W., Fernández D., Villagrá V.A. Enabling an Anatomic View             [18] Laurén S., Rauti S., Leppänen V. An interface diversified honeypot for
     to Investigate Honeypot Systems: A Survey. November 2017. IEEE                       malware analysis. In Proccedings of the 10th European Conference on
     Systems        Journal     11/2017,        pp    (99):1-14.        DOI:              Software Architecture Workshops (ECSAW '16). ACM, New York, NY,
     10.1109/JSYST.2017.2762161.                                                          USA, 2016, Article 29, 6 pages. DOI: 10.1145/2993412.2993417.
[9] Keil, C., Nawrocki, M., Schmidt, T.C., Schönfelder, J., Wählisch, M.: A          [19] Saud Z., Islam M.H. Towards proactive detection of advanced persistent
     Survey on Honeypot Software and Data Analysis. arXiv.org, 2016, vol.                 threat (APT) attacks using honeypots. In Proceedings of the 8th
     10, pp. 63-75.                                                                       International Conference on Security of Information and Networks (SIN
[10] Sokol P., Míšek J., Husák M. Honeypots and honeynets: issues of privacy.             '15). ACM, New York, NY, USA, 2015, pp. 154-157. DOI:
     EURASIP Journal on Information Security.2017, 1, Article 57 (December                10.1145/2799979.2800042.
     2017), 9 pages. DOI: 10.1186/s13635-017-0057-4.                                 [20] Borkar A., Salunke A., Barabde A., Karlekar N. P. Honeypot: a survey of
[11] Nawrocki M., Wahlisch M., Schmidt T., Keil C., Schonfelder J. A Survey               technologies, tools and deployment. In Proceedings of the International
     on Honeypot Software and Data Analysis. 2016. CoRR, abs/1608.06249.                  Conference & Workshop on Emerging Trends in Technology (ICWET
                                                                                          '11). ACM, New York, NY, USA, 2011, pp. 1357-1357. DOI:
[12] Olagunju A.O., Samu F. In Search of Effective Honeypot and Honeynet                  10.1145/1980022.1980327.
     Systems for Real-Time Intrusion Detection and Prevention. In
     Proceedings of the 5th Annual Conference on Research in Information             [21] Shmatova E. The Choice of Strategy for the Spurious Information System
     Technology (RIIT '16). ACM, New York, NY, USA, 2016, pp. 41-46.                      on the Basis of the Game Theory Model. Voprosy kiberbezopasnosti
     DOI: 10.1145/2978178.2978184.                                                        [Cybersecurity issues], 2015. No 5 (13). P. 36-40. DOI: 10.21681/2311-
                                                                                          3456-2015-5-36-40.
[13] Han W., Zhao Z., Doupé A., Ahn G. HoneyMix: Toward SDN-based
     Intelligent Honeynet. In Proceedings of the 2016 ACM International              [22] Liston T. LaBrea: «sticky» Honeypot and IDS. [Online]. Available:
     Workshop on Security in Software Defined Networks & Network                          http://labrea.sourceforge.net/labrea-info.html.
     Function Virtualization (SDN-NFV Security '16). ACM, New York, NY,              [23] Liston          T.         «LaBrea».          [Online].         Available:
     USA, 2016, pp. 1-6. DOI: 10.1145/2876019.2876022.                                    http://labrea.sourceforge.net/labrea.1.txt.
[14] Guarnizo J.D., Tambe A., Bhunia S.S., Ochoa M., Tippenhauer N.O.,               [24] Hopkins A. TARPIT-iptables TARPIT target. [Online]. Available: http:
     Shabtai A., Elovici Y. SIPHON: Towards Scalable High-Interaction                     //www.netfilter.org/projects/patch-o-matic/pom-external.html.
     Physical Honeypots. In Proceedings of the 3rd ACM Workshop on Cyber-            [25] Alt.        L.        Degreaser         git      respository.       2014.
     Physical System Security (CPSS '17). ACM, New York, NY, USA, 2017,                   https://github.com/lancealt/degreaser.
     pp 57-68. DOI: 10.1145/3055186.3055192.
                                                                                     [26] Alt L., Beverly R., Dainotti A. Uncovering network tarpits with degreaser.
[15] Tiwari R. Jain A. Improving network security and design using                        In Proceedings of the 30th Annual Computer Security Applications
     honeypots. In Proceedings of the CUBE International Information                      Conference (ACSAC '14). ACM, New York, NY, USA, 2014, pp. 156-
     Technology Conference (CUBE '12). ACM, New York, NY, USA, 2012,                      165. DOI: 10.1145/2664243.2664285.
     pp. 847-852. DOI: 10.1145/2381716.2381875.
[16] Andrew D., Chi H. An empirical study of botnets on university networks
     using low-interaction honeypots. In Proceedings of the 51st ACM




                                                                                92