ETRI Journal (Jul 2020)

New framework for adaptive and agile honeypots

  • Seamus Dowling,
  • Michael Schukat,
  • Enda Barrett

DOI
https://doi.org/10.4218/etrij.2019-0155
Journal volume & issue
Vol. 42, no. 6
pp. 965 – 975

Abstract

Read online

This paper proposes a new framework for the development and deployment of honeypots for evolving malware threats. As new technological concepts appear and evolve, attack surfaces are exploited. Internet of things significantly increases the attack surface available to malware developers. Previously independent devices are becoming accessible through new hardware and software attack vectors, and the existing taxonomies governing the development and deployment of honeypots are inadequate for evolving malicious programs and their variants. Malware‐propagation and compromise methods are highly automated and repetitious. These automated and repetitive characteristics can be exploited by using embedded reinforcement learning within a honeypot. A honeypot for automated and repetitive malware (HARM) can be adaptive so that the best responses may be learnt during its interaction with attack sequences. HARM deployments can be agile through periodic policy evaluation to optimize redeployment. The necessary enhancements for adaptive, agile honeypots require a new development and deployment framework.

Keywords