Futureinternet 15 00127
Futureinternet 15 00127
Article
A Highly Interactive Honeypot-Based Approach to Network
Threat Management
Xingyuan Yang 1,2 , Jie Yuan 1,2, *, Hao Yang 1 , Ya Kong 1 , Hao Zhang 1 and Jinyu Zhao 1
1 School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 102206, China
2 Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education,
Beijing 100876, China
* Correspondence: [email protected]; Tel.: +86-13810019079
Abstract: In this paper, considering the problem that the common defensive means in the current
cyber confrontation often fall into disadvantage, honeypot technology is adopted to turn reactive into
proactive to deal with the increasingly serious cyberspace security problem. We address the issue of
common defensive measures in current cyber confrontations that frequently lead to disadvantages.
To tackle the progressively severe cyberspace security problem, we propose the adoption of honeypot
technology to shift from a reactive to a proactive approach. This system uses honeypot technology for
active defense, tempting attackers into a predetermined sandbox to observe the attacker’s behavior
and attack methods to better protect equipment and information security. During the research, it was
found that due to the singularity of traditional honeypots and the limitations of low-interactivity
honeypots, the application of honeypot technology has difficulty in achieving the desired protective
effect. Therefore, the system adopts a highly interactive honeypot and a modular design idea to
distinguish the honeypot environment from the central node of data processing, so that the honeypot
can obtain more sufficient information and the honeypot technology can be used more easily. By
managing honeypots at the central node, i.e., adding, deleting, and modifying honeypots and other
operations, it is easy to maintain and upgrade the system, while reducing the difficulty of using hon-
eypots. The high-interactivity honeypot technology not only attracts attackers into pre-set sandboxes
to observe their behavior and attack methods, but also performs a variety of advanced functions,
Citation: Yang, X.; Yuan, J.; Yang, H.; such as network threat analysis, virtualization, vulnerability perception, tracing reinforcement, and
Kong, Y.; Zhang, H.; Zhao, J. A camouflage detection. We have conducted a large number of experimental comparisons and proven
Highly Interactive Honeypot-Based that our method has significant advantages compared to traditional honeypot technology and pro-
Approach to Network Threat
vides detailed data support. Our research provides new ideas and effective methods for network
Management. Future Internet 2023, 15,
security protection.
127. https://doi.org/10.3390/
fi15040127
Keywords: high interaction honeypot; cyber threat analysis; virtualization; vulnerability detection;
Academic Editor: Georgios traceability reinforcement; masquerade detection
Kambourakis
supplementing existing defense measures [1]. Such an approach falls short of meeting
the current demands of network protection. Honeypot technology serves as an active
defense strategy that can effectively supplement the limitations of traditional network
protection measures.
The concept of honeypots was first introduced in 1991 by Clifford Stoll in his book
“The Cuckoo’s Egg”. At that time, only some professional network security personnel
would trace the attackers through some hosts that were actually attacked. Starting in 1998,
honeypot technology attracted a group of developers who developed a series of honeypot
tools, such as DTK developed by Fred Cohen, and Honeyd developed by Niels Provos.
Honeypot technology, which rose in 1999, aims to convert passive network defense into
active defense. Through active interaction with intruders, users can gain valuable insights
into their motives, intentions, and means. This approach offers a technical solution for
predicting network security trends and identifying potential threats before a formal attack
occurs. By doing so, it can help mitigate the harm caused to network infrastructure by
malicious attack behavior. Nowadays, honeypot technology has only been born for more
than 20 years, but its maturity and popularity have reached a very high level domestically
and internationally.
According to Lance Spitzner’s definition, the honeypot is an information system
resource whose value lies in being used unauthenticated and illegally. In other words, a
honeypot is a deliberately crafted trap that can be created in either a virtual or real network
environment. Its purpose is to lure attackers, identify malevolent activities, and gather data
on attack tactics, tools, and objectives. The information gathered from honeypots is used to
analyze the vulnerabilities of both attackers and the systems being imitated. This analysis
indirectly facilitates the protection of the actual network environment [2].
Our research focuses on current honeypot technology and we have found that high-
interaction honeypots, as discussed in “The difference between high-interaction honeypots
and low-interaction honeypots” and “Design and implementation of highly interactive
honeypots”, are more effective at deceiving attackers and attracting their attention. These
honeypots simulate realistic FTP and HTTP services and can create ’baited’ files to gather
in-depth information on hacker behavior. However, if a highly skilled hacker successfully
infiltrates the site and takes control of the system, it will completely expose the network
environment that should be protected, which poses a huge security risk. The article
“Application and research of honeypot technology in information security defense” simply
describes several core modules of honeypots but does not specify the implementation
principle of honeypot application, which is not conducive to the wide application of
honeypot technology. In this study, we present a detailed overview of our designed
honeypot management system model. This model is designed to enhance the ease of use of
the system for specific purposes.
We conducted extensive research on the popular open-source honeypot products
available in the market, including Hfish, SSH-mitm, and Shadow Daemon. Our analysis
revealed that each of these products has certain limitations.
In terms of interactivity, Shadow Daemon and SSH-mitm are categorized as high-
interactivity honeypots, which simulate genuine operating environments and significantly
enhance the attractiveness and concealment of the honeypots for potential attackers. High-
interactivity honeypots offer more comprehensive and detailed data, but their susceptibility
to being compromised by attackers creates a high risk of losing the ability to record attack
information in the event of a breach. The low-interactivity honeypot Hfish lacks the ability
to simulate a real operating environment, resulting in low concealment and attractiveness
compared to high-interactivity honeypots such as Shadow Daemon and SSH-mitm. As a
consequence, the Hfish honeypot is prone to collecting misleading or incomplete attack
data. However, due to its low interactivity, the logging system is relatively separated from
the honey bait and cannot be easily breached by attackers to collect data.
In terms of simplicity, honeypots such as Hfish, SSH-mitm, Shadow Daemon, Dionaea,
etc. are all managed through the command line. Requiring concise commands (e.g.,
Future Internet 2023, 15, 127 3 of 31
MongoDB as the metadata storage. It provides a web interface that allows users to search
and analyze log data and customize rules to monitor log messages and generate alerts.
Graylog also supports the visualization of log data, including charts and dashboards. It also
offers a flexible plugin architecture that can extend its functionality and integrate with other
tools. Overall, Graylog is a powerful log auditing system that provides an effective way for
enterprises to centrally manage and analyze log data. However, like Snort, Graylog also
requires users to set up the log auditing mechanism in advance and uses a command-line
form for user–system interaction. Additionally, the defense mechanisms of both Snort and
Graylog can only react after the intrusion has taken place, and they have a lag in protecting
security objects.
In response to the relative passiveness of intrusion detection systems, intrusion preven-
tion systems (IPS) were developed. IPS is similar to intrusion detection systems (IDS), but
also has the ability to prevent attacks. Here we take the Controller Area Network Intrusion
Prevention System Leveraging Fault Recovery method proposed by Habeeb Olufowobi,
Sena Hounsinou, and Gedare Bloom as an example. This is a new type of IPS for the
CAN bus that can prevent remote message injection attacks and trigger remote damaged
ECU based on reboot recovery. This method combines CAN and IDS and measures their
ability to detect attacks in the delay within the bus speed. The detector node can decide
the message frame that is broadcast between the last transmission of the arbitration field
and the end of the message frame. Its actual recovery period can reach 20 milliseconds.
The recovery mechanism converts the abnormal node to a bus shutdown state in about
6 milliseconds, which is less than the period of a valid message frame. This IPS can be
integrated into real car systems, mitigating the impact of attacks while identifying them
and measuring the performance degradation of reboot-based recovery, and preventing
future attacks [7]. In terms of interactivity, this method offers several advantages. Firstly, it
provides detailed information on the intrusion detection system. This level of detail enables
users to have a more comprehensive understanding of the system’s performance and any
potential security threats. Additionally, the method has the ability to predict potential
intrusions, which allows for more proactive security measures. Moreover, this approach
includes a graphical user interface, which enhances the user–system interaction experience.
The interface provides users with an intuitive and easy-to-use platform to interact with the
system. This convenience can improve overall system usability and promote user adoption.
Identity authentication and access control are currently the most commonly used
network threat management methods, widely used in systems such as Windows, Linux,
and Unix-like systems. This method has undergone significant market improvements
and now features a robust graphical user interface with a user-friendly design, which
enhances user–system interaction. Specifically, the method typically includes a graphical
user interface with 280 different graphical elements that make it easier for users to navigate
and interact with the system. Notwithstanding its benefits, this method has a significant
drawback. Specifically, it employs a passive protection approach that does not actively
monitor security objects or record intrusion behavior. As a result, any intrusion information
is left for security personnel to refer to after the fact, rather than being detected and
prevented in real-time. There is a serious lack of interaction between the system and
security objects.
Compared to previous network threat management methods, which interact passively
with attack behaviors, vulnerability scanners offer a proactive approach to protecting
networks by actively interacting with security objects. Here we take MoScan as an example,
it is a model-based scanner for detecting security vulnerabilities in SSO implementations.
It tests the protocol participants as a black box but builds a state machine to represent the
logic of the login process and guide the generation of test cases. This vulnerability scanner
can scan the security object for vulnerabilities based on its own vulnerability database
before an attack occurs, and the scan information is detailed and has a high degree of
interactivity with the security object [8]. The scanner has been improved by the authors
of the paper, with a graphical user interface, making the interaction between the system
Future Internet 2023, 15, 127 7 of 31
and the user high. Nonetheless, in the event of an actual intrusion by a malicious actor, a
vulnerability scanner would be rendered ineffective. It would be incapable of providing any
meaningful response, documenting intrusion details, or identifying previously unknown
vulnerabilities or targeted attacks. Its capabilities would be limited to scanning for known
vulnerabilities that exist within its vulnerability database.
In conclusion, in terms of interactivity, authentication and access control exhibit the
lowest level of interactivity, whereas the interaction between honeypots and intrusion
detection systems is relatively poor. On the other hand, vulnerability scanners and in-
trusion prevention systems demonstrate more prominent interactivity, with each system
emphasizing distinct areas.
such as setting up a highly deceptive target that entices attackers to launch attacks, thereby
obtaining valuable information about them. Through the arrangement of security targets,
it can effectively increase the cost of attackers and induce them to adopt the wrong attack
methods and tools, thus protecting the organization’s network, systems, applications, and
other assets. Security is defensive and plays an important role in the network security
protection system. It not only captures attackers through decoy targets but also enables
detailed analysis of attackers through monitoring, traceability and other technologies to
provide strong support for later protection. By applying security technologies, it prevents
and avoids network attacks, data leakage, and other security threats, thus ensuring the
safety of data and information of security targets. Simultaneously, the integration of
interactivity and security in a network threat management system is crucial. Interactivity
pertains to the system’s interaction with the user and the extent of information available
to them. A well-designed interactive system enables users to use the system more easily,
leading to improved efficiency and security. Additionally, it facilitates the acquisition of
detailed security information, enhancing the system’s reliability. As such, the security
and interactivity of a cyber threat management system work in tandem to determine the
system’s security and efficiency.
There are many network threat management systems available in the market, including
Honeyd, Dionaea, Kippo, Glastopf, Cowrie, Snort, etc. They have different implementations
and are designed with different security architectures, which result in significant differences
in terms of security. Honeyd is a small daemon that creates virtual hosts on a network. The
hosts can be configured to run any service and can be adjusted to look like they are running
specific operating systems. Honeyd allows a single host to declare multiple addresses for
network simulation on the LAN. Honeyd improves network and self-security by providing
threat detection and evaluation mechanisms. It also deters opponents by hiding real
systems behind virtual systems. However, it is not designed with a CS architecture, which
means that if the honeypot is compromised, the overall security of the system will be lost.
Furthermore, Dionaea is a honeypot designed to emulate a server in order to capture
the attacker’s data. It supports multiple protocols such as HTTP, FTP, TFTP, etc. The
primary objective of this activity is to detect malware that exploits vulnerabilities within the
network’s service offerings. The ultimate aim is to obtain a copy of the malware for analysis.
Given that software that provides network services may contain exploitable vulnerabilities,
it is reasonable to assume that dionaea, which also provides network services, may have
such vulnerabilities as well. To mitigate potential security risks, dionaea is configured
to operate without high privileges and to run within a chroot environment. However, to
execute specific operations that require elevated privileges, dionaea creates a child process
at startup that is authorized to run those operations after the privileges have been granted
and subsequently removed. This does not guarantee anything, but it should be harder to
get root access to the system from an unprivileged user in a chroot environment. However,
this just hides the weakness deeper, and a malicious attacker can still get special privileges
through dionaea.
Kippo is a highly simulated low-interaction SSH honeypot, running as a daemon writ-
ten in Twisted Conch, used to monitor data from attackers. Because it is a low-interaction
honeypot, security is lacking. Furthermore, because it has fewer functions, the possibility
of vulnerabilities in the system itself is relatively small, which increases Kippo’s security
in another dimension. Another attack point for Kippo is its daemon, which relies on
Twisted Conch to write the daemon to self-reset and run, if the security of Twisted Conch is
breached, the security of Kippo will also be affected.
Glastopf is a web application honeypot that simulates a web application to capture data
from attackers. Web applications, databases, and cross-site scripting vulnerabilities create a
substantial attack surface that can be exploited for a variety of malicious purposes, including
website destruction, spam email propagation, website bot program creation, and drive-by
download attacks. Glastopf is a low-interaction honeypot that mimics vulnerable web
servers hosting many web pages and web applications with thousands of vulnerabilities.
Future Internet 2023, 15, 127 10 of 31
Glastopf is easy to set up and receives thousands of attacks every day once it is indexed by
search engines. Glastopf is a Python web application honeypot. Instead of vulnerability
simulation, we use vulnerability-type simulation. Several common attack types are already
established, including remote file inclusion through a built-in PHP sandbox, local file
inclusion that provides access to files from a virtual file system, and HTML injection through
POST requests. The security of Glastopf is not guaranteed due to its low interaction, but
Glastopf has added a PHP sandbox to the security architecture, separating the program’s
runtime environment and program execution environment logic analysis, strengthening
the overall security.
Cowrie is an SSH and Telnet honeypot used to monitor data from attackers. Cowrie
is a medium–high interaction SSH and Telnet honeypot designed to record brute force
attacks and shell interactions performed by attackers. In the medium interaction mode
(shell), it simulates a UNIX system in Python, and in the high interaction mode (proxy),
it acts as an SSH and Telnet proxy to observe the attacker’s behavior towards another
system. It can be run either as a simulated shell or as a proxy for SSH and Telnet to
another system. It provides a complete and available Docker environment, which allows
for deployment environment and physical environment isolation [10]. The security depends
on the relatively secure Docker environment. As a medium-high interaction system, Cowrie
has relatively high security.
Snort is a potent network intrusion detection system that surveils network traffic,
identifying any attack behavior, and currently stands as the world’s most significant open-
source intrusion defense system (IPS). The Snort IPS uses a series of rules to help define
malicious network activity and uses these rules to search for matching packets and generate
alerts for users. Snort can also be deployed inline to block these packets. Snort has three
main uses: as a packet sniffer (such as tcpdump), as a packet recorder—which is useful for
network traffic debugging, or it can be used as a mature network intrusion defense system.
Snort can be downloaded and configured for personal and business use. Unlike traditional
honeypots, Snort has no disguise and relies on transparency to monitor real systems. From
some perspectives, it has no security, it is merely an adjunct to the physical system and
constantly checks for attack behavior.
These network threat management methods each have their own features and are
suitable for different network security purposes, creating a diverse security landscape.
Although honeypots are an effective network security tool, they cannot completely replace
other security measures such as firewalls and encryption. Only by combining with other
security technologies can the system’s security be increased.
network intrusion behavior will be more accurate, the collected information is more diverse
and comprehensive, but it also increases the cost of use and learning for Snort users. The
command-line format used for rule definition and intrusion log function in this intrusion
detection system somewhat undermines its simplicity.
The intrusion prevention system is exemplified by the Controller Area Network Intru-
sion Prevention System Leveraging Fault Recovery method. Its specific implementation
mechanism is divided into four parts: data reconstruction, protocol recognition and pro-
tocol parsing, feature matching, and response processing. Prior to entering the IPS, the
data undergoes IP fragmentation and TCP stream reconstruction to ensure the continuity
of the application layer data. The system then identifies the application layer protocol by
analyzing its content and decodes it in detail according to the specific protocol. Further-
more, the system performs a thorough packet feature extraction. Finally, the parsed packet
features and signatures are matched, and if the signature is hit, a response processing is
performed [7]. On the whole, the IPS is simple in terms of user-friendliness and is easier to
expand. However, expanding the intrusion defense feature library also leads to an increase
in the system’s maintenance costs. At the same time, the increase in system functionality
also increases the complexity of the system framework and the cost of maintenance and use.
The log auditing system, exemplified by Graylog, operates through a combination of
various components, including Input, Extractors, Stream, and Index, with the latter being
the most crucial. Input is a log data capture and acceptance component, while Extractors are
log data format conversion components, allowing for log field conversions from different
sources, such as converting Nginx status codes into English representations. Stream is a log
information classification and grouping component, and Index is a data storage component.
Converted data can be grouped into different Streams by different tag types, and these log
data are stored in the specified Index database for persistent storage. In terms of simplicity,
Graylog is similar to Snort and uses a modular approach, expanding its functionality with
plugins. The framework is easy to understand and easy to expand. Graylog also provides a
web interface with a web interface, which supports log data visualization and allows users
to search and analyze log data, as well as customize rules. The flexible plugin system also
enhances system availability. However, the disadvantage is that the interaction between
the Graylog system and users needs to be completed in a command line form, which
undoubtedly reduces the user-friendliness of the system.
OpenVAS is an open-source vulnerability scanning tool and a branch of the Nessus
project. It is designed to identify security issues on a target network or host. Later on, the
vulnerability scanner was developed and improved independently with a B/S architecture
based on the earlier work. It performs scanning and provides the results of the scan. Its
core component is a server that includes a set of network vulnerability detection programs
that detect security issues in remote systems and applications. This server grants the
user permission to run several different network vulnerability tests (written in the Nessus
attack scripting language). In terms of simplicity, vulnerability scanners are generally
simple in structure, with a regular and organized system structure, while being easy to
extend with additional functionality. Furthermore, OpenVas has a graphical front-end,
and nearly all operations can be done in the graphical interface, which is user-friendly.
However, at the same time, due to the era, the graphical interface is rather old, which
affects its usability. The more huge vulnerability database and system also increase the
overall maintenance difficulty.
Authentication and access control are currently the most widely used methods for
managing network security threats, and they are utilized extensively. The simple core
features also make the system framework simple, and easy to expand and maintain. Due to
their widespread use, the most commonly used authentication systems today have a simple
and user-friendly graphical interface with excellent availability due to frequent updates
and developments.
Honeypots are a relatively simple network security technique. The greatest advantage
of honeypots compared to other security measures is their simplicity. They attract attackers
Future Internet 2023, 15, 127 12 of 31
by mimicking one or more vulnerable hosts or services, capturing attack traffic and samples,
discovering network threats, and extracting threat characteristics. Honeypots do not
involve any special computing and do not require feature databases such as IPS and
vulnerability scanners, or rule libraries such as Snort. All users need to do is place the
honeypot in the system environment and run it, with excellent availability and scalability.
The honeypot system is relatively easy to maintain and does not face the various threats
that more complex security tools do, such as incorrect configuration, system crashes,
and failures.
In conclusion, both identity authentication and access control systems, as well as
honeypot systems, offer a significant advantage in terms of simplicity. However, intrusion
detection systems, intrusion prevention systems, log auditing systems, and vulnerability
scanners pose a significant disadvantage in terms of system simplicity due to the complexity
of their installation and use processes.
2.5. Summary
Through the research and comparison of different network threat management meth-
ods, we find that different network threat management methods have different advantages
in different aspects. For example, honeypot systems have great advantages in terms of
attractiveness and simplicity, but have certain security defects; while intrusion detec-
tion systems have great advantages in terms of security and simplicity, but have serious
shortcomings in terms of attractiveness. Therefore, the emergence of a network threat man-
agement system that takes into account various aspects such as interactivity, attractiveness,
security, and simplicity is particularly urgent and important.
Figure 2. Information Capture Module It is worth noting that in order to ensure high interactivity.
attackers. The attackers can detect, attack, and destroy these systems and use them as tools
for further attacks. Compared to low-interactivity honeypots, high-interactivity honeypots
are more complex in configuration, require more resource support, and have higher risks,
but relatively, they can also collect more valuable information and have a higher degree of
concealment for the attackers. The specific workflow is shown in Figure 5 below.
The honeypots connected to the system are directly provided by the central node with
a simulated operating system to ensure high interactivity. Prior to deployment into the
system, the central node will conduct security checks on the honeypots that seek to join,
ensuring their security and compliance with the central node’s requirements. This process
aims to prevent potential threats to the system’s overall security and stability, as well as to
maintain the honeypot network’s effectiveness in detecting and mitigating attacks. After
connecting to the honeypot system, the central node will assign a specific IP to the honeypot
for internet access. As part of its operation, the system administration module deploys
“baited” files on publicly accessible web and FTP sites, commonly known as “baited” sites.
In the event that an external connection directly accesses these “baited” sites or attempts to
probe the server group and gets redirected to a “baited” site, the system’s “baited” files
will trigger a response to counteract the attempted intrusion.
implementation. We divide the data analysis and processing module into attacker informa-
tion formatting function, information classification function, and risk assessment function.
score (attackPoint). It is mainly used to store the specific information of each network attack
on the system and the scoring and evaluation of the attack by the central node.
Attacker table (Attacker): including attacker ip (attackerIp), attacker information
(attackerInformation), attack times (attackNum), attacker score (attackerPoint), and status.
It is used to save the specific information of the attacker who launched the attack on the
honeypot system.
Installation
Interaction Level Deployment Maintain Information Collected Risk Level
Configuration
Low Simple Simple Limited Low
Medium Involved Involved Variables Medium
High Difficult Difficult Rich High
Future Internet 2023, 15, 127 19 of 31
In our implementation, strict restrictions are imposed on the content security policy at
the backend to ensure secure interaction between the front end and back end. Only API
access from a trustworthy front end is processed. All the honeypots are stored as tuple data
in the central node, consisting of the honeypot IP address, a randomly generated unique
key assigned to each honeypot, and other relevant information. This random key satisfies
the characteristics of a universally unique identifier, ensuring uniqueness and reliability.
This key is kept secret in the central node and there is no way for it to be disclosed after
it is created. This key serves as the unique master key for communication between the
central node and the corresponding honeypot. All communication traffic is encrypted
using the session key generated by this master key in CBC mode AES encryption. To
Future Internet 2023, 15, 127 20 of 31
facilitate critical interactions between the central node and honeypots, a distinct backend
API is utilized. This API accepts encrypted data along with the honeypot IP address. The
central node then maps the IP address to the corresponding universally unique identifier,
decrypts the encrypted data with the matching session key utilizing the CBC mode AES
decryption algorithm, and verifies the data’s validity only if it conforms to specific JSON
object properties. Any other format data or decryption failure is considered an abnormal
interaction and triggers the corresponding exception handling module, rolling back any
information saved in the process. The specific workflow is shown in Figure 8 below.
After receiving a legitimate honeypot interaction, the central node invokes the core
data cross-processing computation method, which is detailed in this paper. The newly
obtained information is analyzed from multiple angles and stored in the database. The core
data cross-processing method involves passing in the authenticated JSON data returned
by each honeypot, which contains key-value pairs. A loop is used to iterate through the
keys, and if a key corresponds to a value that is a JSON object, it is recursively iterated
through. Once all the values are available, they are aggregated into a key-set. This is the
pre-processing step for a copy of the honeypot incoming data. All incoming data must first
be preprocessed as JSON objects. In this way, we obtain a collection consisting of a key table
of keys of individual JSON objects. By performing different set operations on the elements
Future Internet 2023, 15, 127 21 of 31
in the set, the key table can be queried from a specific perspective, and the results obtained
will have specific features. The results are the mapping of the whole dataset under this
feature, which is saved in the database and bound to the feature value for the next query.
The next time a new dataset is imported, we only need to preprocess the new dataset and
perform the set operation on the new key table set again to update the results corresponding
to the features. The newly acquired information is subjected to multidimensional analysis
and is cross-stored. Subsequently, a multi-dimensional attack topology map is generated
with the attacker and honeypot at its center. The map provides insights into the attacker’s
attack path and tactics. Furthermore, it evaluates all the recorded attacks on the honeypot.
In terms of specific honeypot selection, we used Shadow Daemon and Ehoney as our
concrete implementation targets.
Shadow Daemon is a collection of tools for detecting, recording and preventing attacks
on network applications. Technically, Shadow Daemon is a network application firewall
that intercepts requests and filters out malicious parameters. It is a modular system
that separates web applications, analysis, and interface to improve security, flexibility, and
scalability. The software can accurately identify attacks such as SQL injection, XML injection,
code injection, command injection, backdoor access, etc., and accurately record them. This
firewall also incorporates a honeypot. Although most honeypots on the market excel
in attracting and documenting attacks, dynamic network applications expose significant
information compared to conventional network services. As a result, it is easy for hackers
to determine if the application is actively running or if the website’s behavior appears
unnatural, thereby revealing that it is a honeypot and deterring attackers from taking action.
Thus, the existing solutions are primarily useful for gathering information on trusted self-
propagating malware, which represents only a fraction of all attacks. Consequently, the
collected data is incomplete and non-conclusive. To overcome this challenge, the system
must be capable of detecting and logging malicious requests on the production server, as
the authentic target is the only reliable source of information. The collected information is
more meaningful and suitable for research because they are not distorted.
Future Internet 2023, 15, 127 23 of 31
This honeypot has many advantages. Firstly, by default, Shadow Daemon acts as a
web application firewall and blocks malicious requests, but it is also designed to be used
as a high-interactive honeypot. With a few simple modifications to the configuration file,
the protection of the honeypot combined with the firewall can be disabled, allowing the
system to remain hidden in the shadows. This modification increases the efficiency of the
firewall and makes it harder for attackers to detect it as a honeypot, thus making it easier
for the user to collect attack records. Additionally, the combination of the honeypot with
the firewall is easy to operate and generates fewer errors in the collected data, making the
data more authentic. It can be combined with other honeypot systems and integrated into
a honeynet as an additional source of information [2].
However, the honeypot still has many disadvantages: first, the software itself is a
firewall, and protection functions of the firewall need to be disabled for the honeypot to
work normally. If the system does not have another firewall to protect it, the system is likely
to crash and fail to achieve the purpose of the honeypot. Secondly, as a single honeypot, it
lacks attraction to network attacks and attackers lack the motivation to attack. It needs to
be combined with other honeypots to form a honeynet to effectively play its role. Finally,
the configuration process of the honeypot is complex and there is a certain threshold for
new users to use it.
In response to the shortcomings of this honeypot, we have made corresponding im-
provements: we have separated the system firewall from the honeypot, so the honeypot
does not need to close the firewall during operation and have securely authenticated the
high-interaction honeypot through the central node, which issues authentication and regis-
tration information to the honeypot to ensure that the system is adequately protected while
collecting data. Furthermore, we have streamlined the configuration process of the honey-
pot by implementing a more lucid and user-friendly client interface. This modification has
resulted in a lowered barrier to entry for new users. Additionally, we have standardized
the communication protocol between the honeypot and the central node, using a unified
packet format that allows for effortless customization based on individual requirements.
Finally, in response to the issue of weak attraction of this honeypot, we have strengthened
its attraction as an individual honeypot by designing more enticing vulnerabilities, such as
SQL injection vulnerabilities, and expanded its information acquisition scope.
At the same time, we also adopted Ehoney as part of the system connecting to honey-
pots. Ehoney is the first open-source deception defense system from Seccome Teamer. It
categorizes attacks into various phases, including reconnaissance, weapon development,
payload delivery, vulnerability exploitation, implant deployment, ongoing control, and
goal achievement. Moreover, the document outlines corresponding countermeasures to
address each stage of the attack.
The advantages of Ehoney are as follows: Firstly, it is business-oriented, has a simple
and user-friendly operation method, and has a clear front-end, allowing for easy deploy-
ment and viewing of honeypot attack information with just simple operations. Secondly,
Ehoney has comprehensive and detailed documentation, making improvement, communi-
cation and sharing easier, increasing the program’s scalability. Furthermore, this honeypot
can generate various secret signatures, meaning that the characteristics of some accessible
network resources from certain types of files can be modified to generate a secret signature.
When a hacker downloads a document or accesses a folder from an infiltrated server or
honeypot, an alarm is triggered. Finally, Ehoney utilizes topology visualization technology
to present attack views visually, rendering all attacks perceptible, and constructing a com-
prehensive attack chain. This technology renders formerly opaque network defense and
offense transparent, thereby facilitating analysis of the attacker’s methods and objectives.
The disadvantages of Ehoney are also quite obvious: First, Ehoney is a high-interactivity
honeypot system, but due to its high interactivity, it may be exploited by hackers to carry
out lateral exploration and gain root privileges to achieve their ultimate goals. Secondly,
Ehoney lacks honey bait, making it weaker in terms of luring attackers. Finally, while a
Future Internet 2023, 15, 127 24 of 31
single Ehoney honeypot may not be highly tempting, deploying too many can increase the
burden on the server.
In response to the disadvantages of Ehoney, we have made corresponding technical im-
provements: first, while improving the interactivity of the honeypot, we have strengthened
the information isolation between the system and the honeypot to prevent the honeypot
from being used by hackers in reverse. Secondly, we have incorporated additional highly
enticing vulnerabilities as honeypot bait, ensuring that in the event of a honeypot breach,
attackers will not promptly exit and initiate a real server attack, but instead necessitate time
to analyze the acquired data.
In the attack information section, detailed information such as honeypot status and
attacker status can be hidden and removed from the honeypot connected to the central
node. Hidden means temporarily disconnecting the honeypot from the service, but the
honeypot is still connected to the central node and can be online at any time; removed
means disconnecting the central node from the honeypot and disconnecting the honeypot
from the service, and if the service needs to be online again, it needs to be connected to the
central node again. The specific workflow is shown in Figure 11 below.
be found that the modules work well with each other, and the attacker can only leave the
information of his own attack through the docker service of the highly interactive honeypot,
and the attack information is finally collected through the full amount of logs and sent
to the central node after encryption, and the central node can display the summary on
the website management page after processing the information. The central node itself
improves its own security through an intrusion detection system and a firewall.
We put the system online in the public network, assigning ports to different highly
interactive honeypots to run and attracting attacks from the public network, while project
team members also attacked the honeypot system to test its security, leaving the specific
attack information as shown below, the attacker’s IP address, the number of times attacked,
the attack score and the specific information left by the attack can be displayed completely
and intuitively. The results are shown in Figure 12.
The network threat management system presented in this paper is subject to continu-
ous attacks from the network platform on the public network. However, the central node
remains uncompromised throughout the attack process, which is a clear demonstration of
the effectiveness of the network threat management tool developed using this methodology.
This achievement underscores the system’s ability to provide security and resilience in
the face of malicious attacks, thus elevating it to a higher level within the current network
environment.
In this highly interactive honeypot system, the honeypot can accurately collect the IP
address of the attacker, the number of times the attacker uses the IP address to attack the
honeypot, and the score of the attack, when an attacker attacks. These details can help in
determining the threat posed by the attacker and the target. Furthermore, the attacker’s
springboard machine, meat machine, and even the attacker himself can be tracked through
the IP address. Additionally, the honeypot provides some details about the attacker, such as
the cookie used by the attacker, the operating system information used by the attacker, the
attacker’s browser information, and the time of the attack. By analyzing these details, users
can develop insights about the identity and behavior model of the attacker and provide
some help for attack countermeasures. The information collected is shown in Table 2.
At the same time, we will use a highly interactive honeypot network threat manage-
ment system and the mainstream use of traditional network threat management methods
on the market to compare various aspects (here the commonly used snort, suricata, bro,
and this paper uses a highly interactive honeypot network threat management system for
comparison). The specific comparison is shown in Table 3.
Future Internet 2023, 15, 127 28 of 31
A Network Threat
Management System
Parameters Snort [2] Suricata [2] Bro [2]
for Highly Interactive
Honeypots
Unix like system, Win, MacOS, Unix like
Supported Platform Win, MacOS, Unix Win, MacOS, Unix
MacOS system
License GNU GPL V2 GNU GPL V2 BSD NULL
IPS feature Yes Yes No Yes
PGP signed Yes Not Applicable No Yes
Support to high speed
Medium High High High
network
Configuration GUI Yes Yes No Yes
Simultaneously to
Offline Analysis Yes for multiple files Yes for single file Yes for single file
many objects
Threads Single Thread Multithreaded Single Thread Multithreaded
IPV6 Yes Yes No Yes
Installation and
Easy Easy Difficult Easy
Deployment
Detection mode Passive Passive Passive Initiative
As shown in the table above, the network threat management system (NTMS) pro-
posed in this paper offers significant advantages over traditional NTMS. Specifically, the
proposed NTMS boasts strong system applicability, accommodating a variety of operating
systems including Win, MacOS, Linux, and Unix-like systems. Second, it closely fits the
current state-of-the-art network environment. For the current Internet environment with
large data volumes and complex network situations, this paper designs the system to be
applicable to the IPv6 network, while multi-threaded detection improves the data process-
ing volume. Furthermore, in order to facilitate users, this paper designs the system as a
simple operation platform with much lower operation and installation difficulty than Bro
and designs a graphical user interface, which is more straightforward and user-friendly
compared to snort and suricata interfaces. Last but not least, the biggest advantage over
traditional NTMS is that the use of honeypots turns attacks into passive ones, and collects
attack data in advance by setting decoys, so as to reduce irreparable damage caused by
hacker attacks early.
Compared with the current market mainstream use of medium and low-interaction
honeypot systems, the high-interaction honeypot used in this paper has incomparable
advantages, here we use the medium-interaction honeypot kippo [16], low-interaction
honeypot baapp [17], and our high-interaction honeypot system for comparison, the specific
comparison is shown in Table 4.
Through the actual test comparison of the three honeypots, we believe that the NTMS
introduced in this paper has the following advantages: first, compared with the ordinary
low- and medium-interaction honeypots, the system adopts a graphical interface, which
is user-friendly and more guided, and greatly reduces the difficulty of installation and
use; secondly, the high-interaction honeypot utilizes a genuine operating environment
that is more enticing and perplexing for attackers. Consequently, when compared to low-
and medium-interactive honeypots, the highly interactive honeypot system can gather
more data in the same network environment. Additionally, because attackers have more
comprehensive access rights, the highly interactive honeypot system can detect deeper
attacks, obtain more complex types of data, and capture a wider breadth of data. This
breadth of captured data is more conducive to enabling users to improve their systems
based on the attack situation. Finally, in actual use, none of the three honeypots have been
hacked, so the highly interactive honeypot system in this paper ensures the security of the
system by connecting the central node to the real environment. In summary, this paper
concludes that this network threat management approach is a great improvement over
Future Internet 2023, 15, 127 29 of 31
A Network Threat
Management System for
Parameters Baapp [17] Kippo [16]
Highly Interactive
Honeypots
Supported Platform Linux Win, Unix like system Win, MacOS, Unix like system
License V2 V2 NULL
IPS feature Yes Yes Yes
PGP signed No Yes Yes
Support to high speed
Medium Medium High
network
Configuration GUI No No Yes
Simultaneously to many Simultaneously to many Simultaneously to many
Offline Analysis
objects objects objects
Threads Multithreaded Multithreaded Multithreaded
IPV6 No No Yes
Installation and Deployment Difficult Difficult Easy
Detection mode Initiative Initiative Initiative
Amount of data collected(7
23 18 65
days)
Detectable Attack Types 4 4 8
Attack source detection No Yes Yes
Whether the attack depth can
No No Yes
be detected
Attacker Behavior Detection No No Yes
Data capture type 4 4 8
Attack duration Unable to count Unable to count 173 min
6. Discussion
After reviewing the current research and application status of honeypot technology,
this paper proposes a modular design approach for developing a highly interactive hon-
eypot threat management system. The proposed system model is achieved through the
division of honeypot functions. This paper presents a detailed description of the core mod-
ule (central node) of the system, encompassing the information capture module, connection
control module, deployment of honeypots, data analysis and processing, as well as data
storage. Furthermore, by building the model, the practical degree of the model is tested
practically. It is considered that it basically achieves the expected goal of simplifying the
operational difficulty of honeypot technology based on reducing the cost of using it so
that it can be more easily used by SMEs and individual users. Of course, the research and
implementation process also found shortcomings: when deploying multiple honeypots on
the system, a specific analysis of multiple honeypots is required, so that a certain degree
of encapsulation can be carried out to reduce the user’s difficulty in using them. At the
same time, there are various trends in the development of honeypot technology, such as
honeypot-based security technology for even communication networks, honeypot-based
DDoS attack defense technology, honeypot-based anti-phishing technology and honeypot-
based big data technology, etc., which are also potential directions for our subsequent
research. By deploying a range of novel honeypots, we anticipate that we can offer users a
more comprehensive and secure protection system. This advancement will undoubtedly
facilitate the ongoing evolution of honeypots and their associated technologies.
7. Conclusions
By analyzing the current state of honeypot technology research and application, this
thesis adopts a modular design approach to create a highly interactive honeypot threat
Future Internet 2023, 15, 127 30 of 31
management system model by breaking down the honeypot functions. This paper provides
an in-depth account of the system’s overall structure and the specific implementation of
the honeypot, dividing the model into information collection, connection control, honeypot
deployment, and data analysis and processing modules. Additionally, practical tests were
conducted to assess the model’s practicability. Comparing the model with other network
threat management methods, the following conclusions were drawn:
Firstly, the system utilizes honeypot technology to achieve active defense measures
for the network environment while withstanding continuous attacks, demonstrating that
the system has achieved its security and seduction objectives.
Secondly, the system employs numerous high-interaction honeypots as information
collection tools, providing better seduction capabilities than low-interaction honeypots and
yielding more comprehensive information.
Thirdly, the system formats the collected data, utilizing the attacker’s IP address as
the primary key for classification and assessing the harm caused by the attacker to score
and grade it. Users can quickly understand the attacker’s operation and other relevant
information through the attacker’s IP address.
Fourthly, the system offers a user-friendly web interface, reducing the threshold
for usage and promoting the more widespread application of honeypot technology by
simplifying the user’s operational difficulty and enhancing their experience.
Finally, the system adapts to a variety of operating systems, matches the network
environment closely, and has significant improvements in security and proactivity when
compared to traditional network threat management systems.
Author Contributions: Conceptualization, J.Y.; methodology, J.Y.; software, X.Y. and H.Z.; validation,
X.Y., H.Y. and Y.K.; formal analysis, J.Z. and J.Y.; investigation, X.Y.; resources, J.Y.; data curation,
H.Z.; writing—original draft preparation, X.Y.; writing—review and editing, J.Y.; visualization, Y.K.;
supervision, J.Y.; project administration, J.Y.; funding acquisition, J.Y. All authors have read and
agreed to the published version of the manuscript.
Funding: This work is supported by the National Natural Science Foundation of China under
Grant62002028 and Research Innovation Fund for College Students of Beijing University of Posts and
Telecommunications.
Informed Consent Statement: Informed consent was obtained from all subjects involved in the
study. Written informed consent has been obtained from the patients to publish this paper.
Data Availability Statement: The data underlying this article are available in the article.
Acknowledgments: The authors express great appreciation to Guoqiang Xing.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Franco, J.; Aris, A.; Canberk, B.; Uluagac, A.S. A survey of honeypots and honeynets for internet of things, industrial internet of
things, and cyber-physical systems. IEEE Commun. Surv. Tutorials 2021, 23, 2351–2383. [CrossRef]
2. Mairh, A.; Barik, D.; Verma, K.; Jena, D. Honeypot in network security: A survey. In Proceedings of the 2011 International
Conference on Communication, Computing & Security (ICCCS ’11), Rourkela Odisha India, 12–14 February 2011; Association
for Computing Machinery: New York, NY, USA, 2011; pp. 600–605.
3. Ferretti, P.; Pogliani, M.; Zanero, S. Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots.
In Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC’19), London, UK, 11 November
2019; Association for Computing Machinery: New York, NY, USA, 2019; pp. 51–61.
4. Amine, D.M.; Youcef, D.; Kadda, M. IDS-DL: A description language for detection system in cloud computing. In Proceedings
of the 12th International Conference on Security of Information and Networks (SIN ’19), Sochi, Russia, 12–15 September 2019;
Association for Computing Machinery: New York, NY, USA, 2019; pp. 1–8.
5. Antonatos, S.; Anagnostakis, K.; Markatos, E. Honey@home: A new approach to large-scale threat monitoring. In Proceedings of
the 2007 ACM workshop on Recurring malcode (WORM ’07), Alexandria, VA, USA, 2 November 2007; Association for Computing
Machinery: New York, NY, USA, 2007; pp. 38–45.
Future Internet 2023, 15, 127 31 of 31
6. Dhiren, M.; Joshi, H.; Patel, B.K. Towards application classification with vulnerability signatures for IDS/IPS. In Proceedings of
the First International Conference on Security of Internet of Things (SecurIT ’12), Kollam, India, 17–19 August 2012; Association
for Computing Machinery: New York, NY, USA, 2012; pp. 216–221.
7. Chakrabarti, S.; Chakraborty, M.; Mukhopadhyay, I. Study of snort-based IDS. In Proceedings of the International Conference
and Workshop on Emerging Trends in Technology (ICWET ’10), Mumbai, Maharashtra, India, 26–27 February 2010; Association
for Computing Machinery: New York, NY, USA, 2010; pp. 43–47.
8. Olufowobi, H.; Hounsinou, S.; Bloom, G. Controller Area Network Intrusion Prevention System Leveraging Fault Recovery. In
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC’19), London, UK, 11 November
2019; Association for Computing Machinery: New York, NY, USA, 2019; pp. 63–73.
9. Wei, H.; Hassanshahi, B.; Bai, G.; Krishnan, P.; Vorobyov, K. MoScan: A model-based vulnerability scanner for web single sign-on
services. In Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2021),
Online, 11–17 July 2021; Association for Computing Machinery: New York, NY, USA, 2021; pp. 678–681.
10. Belqruch, A.; Maach, A. SCADA security using SSH honeypot. In Proceedings of the 2nd International Conference on Networking,
Information Systems & Security (NISS19), Rabat, Morocco, 27–29 March 2019; Association for Computing Machinery: New York,
NY, USA, 2019; pp. 1–5.
11. Sevvandi, K.; Hideya, O.; Asha, R. Honeyboost: Boosting honeypot performance with data fusion and anomaly detection. Expert
Syst. Appl. 2022, 201, 117073.
12. Yang, F.; Huang, Y.; Zhao, Y.; Li, J.; Jiang, G.; Cheng, J. The Best of Both Worlds: Big Data Programming with Both Productivity
and Performance. In Proceedings of the 2017 ACM International Conference on Management of Data (SIGMOD ’17), Chicago, IL,
USA, 14–19 May 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 1619–1622.
13. Guarnizo, J.D.; Tambe, A.; Bhunia, S.S.; Ochoa, M.; Tippenhauer, N.O.; Shabtai, A.; Elovici, Y. SIPHON: Towards Scalable
High-Interaction Physical Honeypots. In Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security (CPSS ’17),
Abu Dhabi, United Arab Emirates, 2 April 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 57–68.
14. Amal, M.R.; Venkadesh, P. H-DOCTOR: Honeypot based firewall tuning for attack prevention. Meas. Sens. 2023, 25, 100664.
[CrossRef]
15. Dowling, S.; Schukat, M.; Barrett, E. New framework for adaptive and agile honeypots. ETRI J. 2020, 42, 965–975. [CrossRef]
16. Bhosale, D.A.; Mane, V.M. Comparative study and analysis of network intrusion detection tools. In Proceedings of the 2015
International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), Davangere,
Karnataka, India, 29–31 October 2015; pp. 312–315.
17. Bistarelli, S.; Bosimini, E.; Santini, F. A Medium-Interaction Emulation and Monitoring System for Operational Technology. In
Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES 21), Vienna, Austria, 17–20
August 2021; Association for Computing Machinery: New York, NY, USA, 2021; pp. 1–7.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.