Cybersecurity
Introduction

Cybersecurity — the body of knowledge and practices to defend internet-connected devices and products from malicious attacks by hackers, spammers, and cybercriminals — is very important to me. I conduct research into patterns of behavior, tactics, techniques, and procedures used in attacks. These pages and the blog titled "A Pot of Honey" present some of my work in cybersecurity.

I run honeypots to understand how hackers evolve their attack practices. A honeypot is a controlled and safe network-connected system — typically, but not always, a computer — that is set up as a decoy to lure cyberattackers. In other words, a honeypot is a deception device designed to look like a targetable system for the purpose of attracting attackers. Attack activity against the honeypot is recorded and later analyzed by researchers.

I use Cowrie, a fantastic open-source honeypot capable of collecting attack information over the SSH and Telnet protocols. Cowrie provides an emulation of a Debian-like Linux system. It excels at logging brute-force attacks and interactions performed by attackers on the remote shell.

As, unfortunately, attacks on connected devices are all but ubiquitous, Cowrie generates large amounts of data. I use a MySQL database to host a local copy of the data. I process and analyze the collected data using homegrown tools and APIs developed in Go, Python and the Bash scripting language. As part of the data crunching, I augment the attack data collected by Cowrie with malware information from VirusTotal and IP address information from MaxMind GeoLite2. Both services offer free tiers with reasonable limits on API consumption, so the whole analysis can be performed very cost-effectively. The configuration notes page includes additional details on the set up of my honeypot environment.

Honeypot setup
Honeypot setup

I share some of my work on this website and some with the cyber community. See the Results section below for details. For a preview of on-going and upcoming research activitlies, you can take a look at the Future Work section.

Results
Data Icon
Unwanted traffic information presented as dashboards containing metrics, lists, charts, and maps. Updated daily.
Search Icon
Check if an IP address or autonomous system (AS) is in our database as possible origin of unwanted traffic.
API Icon
JSON-based REST API to extract information from our database of unwanted traffic.
Contributions Icon
My daily contributions of suspect IP addresses to AbuseIPDB.

Unwanted traffic detected between July 26, 2023 and yesterday

The chart above displays the trend over time of the unwanted traffic received on my honeypot, in each of its two categories of scans and attacks. The time between data points in the chart is hours. You can find more details here.

Operating honeypots results in a data-rich environment that offers opportunities for further research. I am currently pursuing the following lines of investigation: