HoneyMonkey

HoneyMonkey

HoneyMonkey, short for Strider HoneyMonkey Exploit Detection System, is a Microsoft Research honeypot. The implementation uses a network of computers to crawl the World Wide Web searching for websites that use browser exploits to install malware on the HoneyMonkey computer. A snapshot of the memory, executables and registry of the honeypot computer is recorded before crawling a site. After visiting the site, the state of memory, executables, and registry is compared to the previous snapshot. The changes are analyzed to determine whether the visited site installed malware onto the honeypot computer.

HoneyMonkey is based on the honeypot concept, with the difference that it actively seeks websites that try to exploit it. The term was coined by Microsoft Research in 2005. With honeymonkeys it is possible to find open security holes that aren't yet publicly known but are exploited by attackers.

Technology

A single HoneyMonkey is an automated program, that tries to mimic the action of a user surfing the net. A series of HoneyMonkeys are run on virtual machines running Windows XP, at various levels of patching — some are fully patched, some fully vulnerable, and others in between these two extremes. The HoneyMonkey program records every read or write of the file system and registry, thus keeping a log of what data was collected by the web-site and what software was installed by it. Once the program leaves a site, this log is analyzed to determine if any malware has been loaded. In such cases, the log of actions is sent for further manual analysis to an external controller program, which logs the exploit data and restarts the virtual machine to allow it to crawl other sites starting in a known uninfected state.

Initiating crawling

Out of the 10 billion plus web pages, there are many legitimate sites that do not use exploit browser vulnerabilities, and to start crawling from most of these sites would be a waste of resources. An initial list was therefore manually created that listed sites known to use browser vulnerabilities to compromise visiting systems with malware. The HoneyMonkey system then follows links from exploit sites, as they had higher probability of leading to other exploit sites. The HoneyMonkey system also records how many links point to an exploit site thereby giving a statistical indication of how easily an exploit site is reached.

Exploit detection

HoneyMonkey uses a black box system to detect exploits, i.e., it doesn't use a signature of browser exploits to detect exploits. A Monkey Program, a single instance of the HoneyMonkey project, launches Internet Explorer to visit a site. In addition, it also records all registry and file read or write operations. The monkey does not allow pop-ups, nor does it allow installation of software. Any read or write that happens out of Internet Explorer's temporary folder therefore must have used browser exploits. These are then analyzed by malware detection programs and then manually analyzed. The monkey program then restarts the virtual machine to crawl another site in a fresh state.

See also

* Client honeypot / honeyclient

References

* [http://research.microsoft.com/honeymonkey/article.aspx MSR article]
* [ftp://ftp.research.microsoft.com/pub/tr/TR-2005-72.pdf MSR Technical Paper]

External links

*eWeek articles: [http://www.eweek.com/article2/0,1759,1817822,00.asp 1] , [http://www.eweek.com/article2/0,1895,1844687,00.asp 2]
*Honeyclient - An open source client honeypot that drives IE similar to HoneyMonkey [http://www.honeyclient.org]
*HoneyC - A low interaction client honeypot framework [https://www.client-honeynet.org/]


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Client honeypot — Honeypots are security devices whose value lie in being probed and compromised. Traditional honeypots are servers (or devices that expose server services) that wait passively to be attacked. Client Honeypots are active security devices in search… …   Wikipedia

  • Honeypot (computing) — In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a… …   Wikipedia

  • Microsoft Comic Chat — Microsoft Chat version 2.5 Original author(s) Microsoft Developer(s) David Kurlander, Microsoft Research Virtual Worlds Group …   Wikipedia

  • Allegiance (video game) — For other uses of Allegiance , see Allegiance (disambiguation). Allegiance Developer(s) Microsoft Research Publisher(s) …   Wikipedia

  • — Paradigm(s) multi paradigm: structured, imperative, object oriented, event driven, functional Appeared in 2003 Desig …   Wikipedia

  • Dancing pigs — In computer security, the dancing pigs problem (also known as the dancing bunnies problem) is a statement on user attitudes to computer security: that users primarily desire features without considering security, and so security must be designed… …   Wikipedia

  • Singularity (operating system) — For other uses of Singularity , see Singularity (disambiguation). Singularity Project Singularity after boot up. Company / developer Microsoft Corporation Programmed in Assembly language, C …   Wikipedia

  • Avalanche (P2P) — Avalanche is the name of a proposed peer to peer (P2P) network created by Pablo Rodriguez and Christos Gkantsidis at Microsoft, which claims to offer improved scalability and bandwidth efficiency compared to existing P2P systems. The proposed… …   Wikipedia

  • Microsoft Research — Website research.microsoft.com Microsoft Research (MSR) is the research division of Microsoft created in 1991 for developing various computer science ideas and integrating them into Microsoft products. It currently employs Turing Award winners… …   Wikipedia

  • MyLifeBits — is a Microsoft Research project. It was inspired by Vannevar Bush s hypothetical Memex computer system. The project includes full text search, text and audio annotations, and hyperlinks. The experimental subject of the project is computer… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”