Analysis of embedded web applications for honeypot emulation programs

Jacob Farneth, Avneep Dhanju, Jeremy Joseph Blum

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

This paper describes a process for analyzing web server requests and responses for use in developing emulation programs for low interaction honeypot responses. In order to manage the complexity of this task, this approach first identifies that static and dynamic resources made available from a web server. Then, for each dynamic resource a fuzzing approach was used to generate and analyze the range of responses for a range of requests, including ones with the types of malformed input that can appear in computer security attacks.

Original languageEnglish (US)
Title of host publication2012 IEEE 16th International Symposium on Consumer Electronics, ISCE 2012
DOIs
StatePublished - 2012
Event2012 IEEE 16th International Symposium on Consumer Electronics, ISCE 2012 - Harrisburg, PA, United States
Duration: Jun 4 2012Jun 6 2012

Other

Other2012 IEEE 16th International Symposium on Consumer Electronics, ISCE 2012
CountryUnited States
CityHarrisburg, PA
Period6/4/126/6/12

Fingerprint

Servers
Security of data

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering
  • Industrial and Manufacturing Engineering

Cite this

Farneth, J., Dhanju, A., & Blum, J. J. (2012). Analysis of embedded web applications for honeypot emulation programs. In 2012 IEEE 16th International Symposium on Consumer Electronics, ISCE 2012 [6241731] https://doi.org/10.1109/ISCE.2012.6241731
Farneth, Jacob ; Dhanju, Avneep ; Blum, Jeremy Joseph. / Analysis of embedded web applications for honeypot emulation programs. 2012 IEEE 16th International Symposium on Consumer Electronics, ISCE 2012. 2012.
@inproceedings{ccab1bd6e7f94ba28ed846444b7fb80c,
title = "Analysis of embedded web applications for honeypot emulation programs",
abstract = "This paper describes a process for analyzing web server requests and responses for use in developing emulation programs for low interaction honeypot responses. In order to manage the complexity of this task, this approach first identifies that static and dynamic resources made available from a web server. Then, for each dynamic resource a fuzzing approach was used to generate and analyze the range of responses for a range of requests, including ones with the types of malformed input that can appear in computer security attacks.",
author = "Jacob Farneth and Avneep Dhanju and Blum, {Jeremy Joseph}",
year = "2012",
doi = "10.1109/ISCE.2012.6241731",
language = "English (US)",
isbn = "9781467313544",
booktitle = "2012 IEEE 16th International Symposium on Consumer Electronics, ISCE 2012",

}

Farneth, J, Dhanju, A & Blum, JJ 2012, Analysis of embedded web applications for honeypot emulation programs. in 2012 IEEE 16th International Symposium on Consumer Electronics, ISCE 2012., 6241731, 2012 IEEE 16th International Symposium on Consumer Electronics, ISCE 2012, Harrisburg, PA, United States, 6/4/12. https://doi.org/10.1109/ISCE.2012.6241731

Analysis of embedded web applications for honeypot emulation programs. / Farneth, Jacob; Dhanju, Avneep; Blum, Jeremy Joseph.

2012 IEEE 16th International Symposium on Consumer Electronics, ISCE 2012. 2012. 6241731.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Analysis of embedded web applications for honeypot emulation programs

AU - Farneth, Jacob

AU - Dhanju, Avneep

AU - Blum, Jeremy Joseph

PY - 2012

Y1 - 2012

N2 - This paper describes a process for analyzing web server requests and responses for use in developing emulation programs for low interaction honeypot responses. In order to manage the complexity of this task, this approach first identifies that static and dynamic resources made available from a web server. Then, for each dynamic resource a fuzzing approach was used to generate and analyze the range of responses for a range of requests, including ones with the types of malformed input that can appear in computer security attacks.

AB - This paper describes a process for analyzing web server requests and responses for use in developing emulation programs for low interaction honeypot responses. In order to manage the complexity of this task, this approach first identifies that static and dynamic resources made available from a web server. Then, for each dynamic resource a fuzzing approach was used to generate and analyze the range of responses for a range of requests, including ones with the types of malformed input that can appear in computer security attacks.

UR - http://www.scopus.com/inward/record.url?scp=84866486960&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84866486960&partnerID=8YFLogxK

U2 - 10.1109/ISCE.2012.6241731

DO - 10.1109/ISCE.2012.6241731

M3 - Conference contribution

AN - SCOPUS:84866486960

SN - 9781467313544

BT - 2012 IEEE 16th International Symposium on Consumer Electronics, ISCE 2012

ER -

Farneth J, Dhanju A, Blum JJ. Analysis of embedded web applications for honeypot emulation programs. In 2012 IEEE 16th International Symposium on Consumer Electronics, ISCE 2012. 2012. 6241731 https://doi.org/10.1109/ISCE.2012.6241731