With the growing diversity of malware, researchers must be able to quickly collect many representative samples for study. This is commonly achieved by harvesting the malware from honeypots: Insecure systems presenting a wide attack surface to the public Internet, aiming to attract attackers. However, software-based honeypots have both performance issues in light of 10+ Gb/s networks, as well as difficulties in preventing the compromise of the honeypot system itself. We present an architecture for a honeypot using dedicated hardware instead of a general-purpose processor. Our system is fast enough to keep up with high-speed networks and more resilient against subversion attempts than existing software solutions. It consists of a high-speed implementation of the Internet protocol stack attached to hardware-based emulations of vulnerable applications. A specialized implementation of the TCP protocol, capable of managing hundreds of thousands of simultaneous connections, allows the system to span large honeynets. The practical feasibility of the approach has been demonstrated on a real FPGA platform connected to a 10 Gb/s network interface.
[1]
Andreas Koch,et al.
MalCoBox: Designing a 10 Gb/s Malware Collection Honeypot Using Reconfigurable Technology
,
2010,
2010 International Conference on Field Programmable Logic and Applications.
[2]
Wesley M. Eddy,et al.
TCP SYN Flooding Attacks and Common Mitigations
,
2007,
RFC.
[3]
Emin Gün Sirer,et al.
Trickles: a stateless network stack for improved scalability, resilience, and flexibility
,
2005,
NSDI.
[4]
Anja Feldmann,et al.
On dominant characteristics of residential broadband internet traffic
,
2009,
IMC '09.
[5]
Ioannis Zisis,et al.
An open TCP/IP core for reconfigurable logic
,
2005,
13th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM'05).
[6]
Stefan Savage,et al.
Inside the Slammer Worm
,
2003,
IEEE Secur. Priv..
[7]
Jon Postel,et al.
Transmission Control Protocol
,
1981,
RFC.