Document Type

Conference Proceeding

Publisher

Edith Cowan University

Faculty

Computing, Health and Science

School

Computer and Information Science

RAS ID

5157

Comments

This article was originally published as: Yek, S. (2006). Leading hackers down the garden path. Proceedings of the 4th Australian Digital Forensics Conference. (pp. 136-152). Perth, Australia: Edith Cowan University. Original article available here

Abstract

Can a hacker be controlled by predetermined deception? Limiting the decision making capabilities of hackers is one technique of network countermeasure that a honeynet enables. By furnishing a honeynet with a realistic range of services but restricted vulnerabilities, a hacker may be forced to direct their attacks to the only available exploits. This research discusses the deployment of a honeynet configured with a deceptive TELNET and TFTP exploit. Four hackers were invited to attack the honeynet and the analysis of their compromise identified if they engaged in a guided pathway to the intended deception. Hand trace analysis was performed on network log files to determine their primary attack vector. Conceptual analysis and frequency analyses methods were adopted to verify the hacker’s compromise and subsequent deception. The results demonstrated how three out of four hackers were lead down a misguided pathway of network deception.

DOI

10.4225/75/57b267b440cb5

Access Rights

free_to_read

 
COinS
 

Link to publisher version (DOI)

10.4225/75/57b267b440cb5