{"title":"Estimating Application Cyberthreat Impact Score for Honeypot Coverage Prioritization","authors":"Matej Kren, A. Kos, Urban Sedlar","doi":"10.1109/CoBCom55489.2022.9880757","DOIUrl":null,"url":null,"abstract":"Honeypots are one of the important mechanisms in cybersecurity; they represent resources that appear interesting to attackers - either computing resources or data - but are deployed with the sole purpose of studying the techniques and tools of the attackers themselves. As such they are an invaluable resource for detecting the attacks, tools, and for protecting the systems, and many novel domains of application exist. In this paper we present a metric for evaluating the attractiveness of new types of honeypots, that aims to strike a balance between attractiveness of the honeypot for attackers and the real-world popularity of the mimicked system, which is reflected in the usefulness of the collected data. The score is based on the vulnerability density, breach cost, effectiveness of countermeasures, the compliance index, and the size of the real-world install base of the application. A practical calculation is presented based on the proposed formula.","PeriodicalId":131597,"journal":{"name":"2022 International Conference on Broadband Communications for Next Generation Networks and Multimedia Applications (CoBCom)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Broadband Communications for Next Generation Networks and Multimedia Applications (CoBCom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CoBCom55489.2022.9880757","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Honeypots are one of the important mechanisms in cybersecurity; they represent resources that appear interesting to attackers - either computing resources or data - but are deployed with the sole purpose of studying the techniques and tools of the attackers themselves. As such they are an invaluable resource for detecting the attacks, tools, and for protecting the systems, and many novel domains of application exist. In this paper we present a metric for evaluating the attractiveness of new types of honeypots, that aims to strike a balance between attractiveness of the honeypot for attackers and the real-world popularity of the mimicked system, which is reflected in the usefulness of the collected data. The score is based on the vulnerability density, breach cost, effectiveness of countermeasures, the compliance index, and the size of the real-world install base of the application. A practical calculation is presented based on the proposed formula.