College of Engineering, Design & Computing Events

CSCI seminar series, Delivering Honeypots as a Service

| 12:00 PM - 01:00 PM
Room Number : 800 (Mac Lab)
Lawrence Street Center
1380 Lawrence Street
Denver, CO
Presented by Haadi Jafarian, assistant professor of computer science

Abstract:
The effect of honeypots in slowing down attacks and collecting their signatures is well-known. Despite their known effectiveness, these technologies have remained underutilized, especially by small and medium-sized enterprises, because internal hosting and configuration of honeypots requires extensive expertise and infrastructure, which is unjustifiably expensive especially for small or medium-sized enterprises. In this talk, we introduce a novel security approach that enables a security service provider to offer honeypot-as-a-service (HaaS) to customer enterprises. The HaaS service is offered by a plug-and-play gateway and incorporates a network of moving high-interaction honeypots into unused address space of client enterprises. These honeypots are configured tailored to the mission and type of services offered by the customer enterprise to blend in the surrounding network for maximum believability while looking vulnerable enough to engage potential attackers. We formulate and solve the problem of strategic configuration planning of a group of honeypots for a given input network. We also provide the necessary infrastructure and mechanisms for realizing the model and offering it to client enterprises without affecting their regular operations. Using experimental and analytical modeling, we evaluate our approach and show its robustness against honeypot mapping attacks, and its effectiveness in slowing down large-scale cyber intrusion attacks on enterprise networks.

Bio 
Haadi Jafarian is an assistant professor in the Department of Computer Science and Engineering at CU Denver. He is also the director of the Active Cyber and Infrastructure Defense (ACID) lab. His research interests include a variety of topics in security and privacy, including but not limited to active cyber defense (cyber deception, moving target defense), data analytics for cybersecurity, network security, Web security, and access control.

CMS Login