[Defense] Cyber Deception against Adversarial Reconnaissance in Enterprise Network using Semi-Indistinguishable Honeypot
Thursday, April 4, 2024
10:00 am - 11:30 am
In
Partial
Fulfillment
of
the
Requirements
for
the
Degree
of
Doctor
of
Philosophy
Shanto
Roy
will
defend
his
dissertation
Cyber
Deception
against
Adversarial
Reconnaissance
in
Enterprise
Network
using
Semi-Indistinguishable
Honeypot
Abstract
Cyber deception involves deliberately misleading attackers within a network to thwart their malicious activities, often by presenting them with false information or decoy assets. It is essential for defending enterprise networks as it helps mitigate potential damage and minimize the impact of successful attacks. This dissertation addresses two significant issues in cyber deception: (1) most honeypots can be detected and avoided by adversaries, and (2) the absence of effective human evaluation in current literature to measure deception capability. While previous works explored honeypot-based deception strategies, very few have deployed their systems in real life, considered detection avoidance by attackers, and evaluated their systems with human attackers. As such, there is no standard evaluation strategy for measuring the efficiency of honeypot-based deception systems. To fill the research gaps, our work proposes a new deception system named DARSH (Deceive Adversaries through Redirection to Semi-Indistinguishable Honeypot Web Servers), which employs a semi-indistinguishable honeypot to deceive attackers and protect sensitive information. A semi-indistinguishable honeypot mimics the services and configurations of a real server while hiding sensitive information via content modification. DARSH is a multi-layer approach that redirects attackers to the honeypot, which has an identical network configuration as the original server. To hide sensitive information at the application layer, DARSH clones the application server with sensitive information obfuscated. We extensively evaluate our work in three steps: technical evaluation, human evaluation, and case study. First, we prove the effectiveness of deceiving attackers’ reconnaissance by examining the tool outputs during technical evaluation. Then, through human evaluation, we show that participants with academic or professional-level cyber security knowledge cannot distinguish the honeypot from a real server. Finally, case studies reveal that advanced pen testers cannot detect the presence of the honeypot while employing existing honeypot detection techniques, including fingerprinting and timing analysis.
Thursday,
April
4,
2024
10:00
AM
-
11:30
AM
CT
PGH 501B
Dr. Omprakash Gnawali, dissertation advisor
Faculty, students, and the general public are invited.

- Location
- Room 501B, Philip Guthrie Hoffman Hall (PGH), 3551 Cullen Blvd, Houston, TX 77204, USA