Keywords: honeypots, intrusion detection systems, worms, malicious internet traffic, internet attacks, critical infrastructures
The HoneyTank: a scalable approach to collect malicious internet traffic
In this paper, we propose an efficient method for collecting large amounts of malicious internet traffic. The key advantage of our method is that it does not need to maintain any state to emulate TCP services running on a large number of emulated end-systems. We implemented a prototype on the ASAX intrusion detection system and we provide several examples of the malicious activities that were collected on a campus network attached to the internet. We explain how we implemented various protocols in a stateless way. We also discuss how our method can be improved to make an accurate but still stateless emulation of stateful protocols.