2018-01-03 10:25:36 +01:00
{
2018-01-03 13:54:07 +01:00
"namespace" : "honeypot-basic" ,
2018-08-31 07:19:41 +02:00
"description" : "Updated from Christian Seifert, Ian Welch, Peter Komisarczuk, ‘ Taxonomy of Honeypots’ , Technical Report CS-TR-06/12, VICTORIA UNIVERSITY OF WELLINGTON, School of Mathematical and Computing Sciences, June 2006, http://www.mcs.vuw.ac.nz/comp/Publications/archive/CS-TR-06/CS-TR-06-12.pdf" ,
"version" : 2 ,
2018-01-03 10:25:36 +01:00
"predicates" : [
{
"value" : "interaction-level" ,
"expanded" : "Interaction Level" ,
"description" : "Describes whether the exposed functionality of a honeypot is limited in some way, which is usually the case for honeypots that simulate services."
} ,
{
2018-01-03 10:40:19 +01:00
"value" : "data-capture" ,
"expanded" : "Data Capture" ,
"description" : "Describes the type of data a honeypot is able to capture"
2018-01-03 10:25:36 +01:00
} ,
{
2018-01-03 10:51:34 +01:00
"value" : "containment" ,
"expanded" : "Containment" ,
"description" : "Classifies the measures a honeypot takes to defend against malicious activity spreading from itself."
2018-01-03 10:25:36 +01:00
} ,
{
2018-01-03 10:59:32 +01:00
"value" : "distribution-appearance" ,
"expanded" : "Distribution Appearance" ,
"description" : "Describes whether the honeypot system appears to be confined to one system or multiple systems."
2018-01-03 10:25:36 +01:00
} ,
{
2018-01-03 11:09:06 +01:00
"value" : "communication-interface" ,
"expanded" : "Communication Interface" ,
"description" : "Describes the interfaces one can use to interact directly with the honeypot."
2018-01-03 10:25:36 +01:00
} ,
{
2018-01-03 11:14:36 +01:00
"value" : "role" ,
"expanded" : "Role in Multi-tier Architecture" ,
"description" : "Describes in what role the honeypot acts within a multi-tier architecture."
2018-01-03 10:25:36 +01:00
}
] ,
"values" : [
{
"predicate" : "interaction-level" ,
"entry" : [
{
"value" : "high" ,
"expanded" : "High Interaction Level" ,
"description" : "Exposed functionality of the honeypot is not limited."
} ,
{
"value" : "low" ,
"expanded" : "low Interaction Level" ,
"description" : "Exposed functionality being limited. For example, a simulated SSH server of a honeypot is not able to authenticate against a valid login/password combination"
2018-08-31 07:19:41 +02:00
} ,
{
"value" : "none" ,
"expanded" : "No interaction capabilities" ,
"description" : "No exposed functionality in the honeypot."
2018-01-03 10:25:36 +01:00
}
]
2018-01-03 10:40:19 +01:00
} ,
{
"predicate" : "data-capture" ,
"entry" : [
{
2018-08-31 07:19:41 +02:00
"value" : "network-capture" ,
"expanded" : "Network capture" ,
"description" : "The honeypot collects raw network capture."
} ,
{
2018-01-03 10:40:19 +01:00
"value" : "events" ,
"expanded" : "Events" ,
"description" : "The honeypot collects data about something that has happened or took place, a change in state."
} ,
{
"value" : "attacks" ,
"expanded" : "Attacks" ,
"description" : "The honeypot collects malicious activity."
} ,
{
"value" : "intrusions" ,
"expanded" : "Intrusions" ,
"description" : "The honeypot collects malicious activity that leads to a security failure."
} ,
{
"value" : "none" ,
"expanded" : "None" ,
"description" : "The honeypot does not collect events, attacks, or intrusions."
}
]
2018-01-03 10:51:34 +01:00
} ,
{
"predicate" : "containment" ,
"entry" : [
{
"value" : "block" ,
"expanded" : "Block" ,
"description" : "Attacker’ s actions are identified and blocked. The attack never reaches the target."
} ,
{
"value" : "defuse" ,
"expanded" : "Defuse" ,
"description" : "The attack reaches the target, but is manipulated in a way that it fails against the target."
} ,
{
"value" : "slow-down" ,
"expanded" : "Slow Down" ,
"description" : "Attacker is slowed down in his actions of spreading malicious activity."
} ,
{
"value" : "none" ,
"expanded" : "None" ,
"description" : "No action is taken to limit the intruder’ s spread of malicious activity against other systems."
}
]
2018-01-03 10:59:32 +01:00
} ,
{
"predicate" : "distribution-appearance" ,
"entry" : [
{
"value" : "distributed" ,
"expanded" : "Distributed" ,
"description" : "The honeypot is or appears to be composed of multiple systems."
} ,
{
"value" : "stand-alone" ,
"expanded" : "Stand-Alone" ,
"description" : "The honeypot is or appears to be one system."
}
]
2018-01-03 11:09:06 +01:00
} ,
{
"predicate" : "communication-interface" ,
"entry" : [
{
"value" : "network-interface" ,
"expanded" : "Network Interface" ,
"description" : "The honeypot can be directly communicated with via a network interface."
} ,
{
"value" : "hardware-interface" ,
"expanded" : "Non-Network Hardware Interface" ,
"description" : "Examples: Printer port, CDROM drives, USB connections."
} ,
{
"value" : "software-api" ,
"expanded" : "Software API" ,
"description" : "The honeypot can be interacted with via a software API."
}
]
2018-01-03 11:14:36 +01:00
} ,
{
"predicate" : "role" ,
"entry" : [
{
"value" : "server" ,
"expanded" : "Server" ,
"description" : "The honeypot is passively awaiting requests from clients."
} ,
{
"value" : "client" ,
"expanded" : "Client" ,
"description" : "The honeypot is actively initiating requests to servers."
}
]
2018-01-03 10:25:36 +01:00
}
]
}