Any packet destined to a honeypot machine (that is, a decoy server machine) is most probably an attack packet. We propose honeypot back-propagation, a scheme that traces attack packets received by honeypots back to their source(s) and stops the attack source(s). In the proposed scheme, a server acts as a honeypot for some periods of time (honeypot epochs) and automatically triggers a hop-by-hop traceback of possible attackers (through back-propagation) during each honeypot epoch. In order to make the honeypots even much harder to evade, the start and end times of each honeypot epoch are unpredictable to attackers. We also propose progressive back-propagation, in which the information gathered during a honeypot epoch is used in subsequent epochs, to handle low-rate attacks, such as on-off attacks with short bursts. We developed an analytical model to estimate the expected time to reach and stop an attack source in the case of continuous and on-off attacks. Through ns-2 simulations, we ...
Sherif M. Khattab, Rami G. Melhem, Daniel Moss&eac