Loading...

HoneyProcs : Going Beyond Honeyfiles for Deception on Endpoints

In Summary : Deploying detection solutions on an endpoint host comes with constraints - limited availability of CPU, memory, disk and othe...

In Summary :

Deploying detection solutions on an endpoint host comes with constraints - limited availability of CPU, memory, disk and other resources, stability constraints, policy adherence and restrictions, the need to be non-intrusive to the user, the host OS and other applications on the host.In response to this, we present HoneyProcs, a new deception methodology (patent pending) and an all user space method that extends existing deception honeypot technology on endpoint hosts. HoneyProcs complements existing deception technology by using forged, controlled decoy processes to catch info stealers, Banking Trojans, rootkits and other generic malware, and it does so by exploiting a common trait exhibited by these malwares - code injection.By limiting its inspection footprint to only these decoy processes, HoneyProcs effectively addresses efficacy and performance concerns that otherwise constrain endpoint deployments.  Throughout this article, we further explain how the reduced and targeted inspection footprint can be leveraged to turn HoneyProcs into an intelligence gathering toolkit that can be used to write automated signatures for other antivirus and detection solutions to remediate infections on the system.​ [...]

kindly refer the following link as follow up :
https://forums.juniper.net/t5/Threat-Research/HoneyProcs-Going-Beyond-Honeyfiles-for-Deception-on-Endpoints/ba-p/385830

Post a Comment

  1. Incident-response tools are becoming increasingly important as new regulations and legislation stipulate disclosure after security breaches.

    ReplyDelete

emo-but-icon

Home item

ADS

Popular Posts

Random Posts

Flickr Photo

StatCounter

View My Stats