@inproceedings{d1a3c6cf39804dc68d85e7f957a4ae06,
title = "Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning",
abstract = "We present a scalable honeynet system built on Xen using virtual machine introspection and cloning techniques to efficiently and effectively detect intrusions and extract associated malware binaries. By melding forensics tools with live memory introspection, the system is resistant to prior in-guest detection techniques of the monitoring environment and to subversion attacks that may try to hide aspects of an intrusion. By utilizing both copy-on-write disks and memory to create multiple identical high-interaction honeypot clones, the system relaxes the linear scaling of hardware requirements typically associated with scaling such setups. By employing a novel routing approach our system eliminates the need for post-cloning network reconfiguration, allowing the clone honeypots to share IP and MAC addresses while providing concurrent and quarantined access to the network. We deployed our system and tested it with live network traffic, demonstrating its effectiveness and scalability.",
author = "Lengyel, {Tamas K.} and Justin Neumann and Steve Maresca and Aggelos Kiayias",
year = "2013",
doi = "10.1007/978-3-642-38631-2_13",
language = "English",
isbn = "978-3-642-38630-5",
series = "Lecture Notes in Computer Science (LNCS)",
publisher = "Springer",
pages = "164--177",
booktitle = "Network and System Security - 7th International Conference",
address = "United Kingdom",
}