Deceptive directories and “vulnerable” logs: a honeypot study of the LDAP and log4j attack landscape

Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis

Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

8 Citationer (Scopus)
228 Downloads (Pure)

Abstract

The Lightweight Directory Access Protocol (LDAP) has been widely used to query directory services. It is mainly utilized for reading, writing, and searching directory services like the Active Directory. The vast adoption of LDAP for authentication has entailed several attack attempts like injection attacks and unauthorized access due to third-party key storage. Furthermore, recent vulnerabilities discovered in libraries like the Log4j can lead adversaries to obtain unauthorized information from the directory services through pivoting attacks. Moreover, the LDAP can be configured to operate on UDP, motivating adversaries to exploit it for Distributed Reflection Denial of Service attacks (DRDoS). This paper presents a study of attacks on the LDAP by deploying honeypots that simulate multiple profiles that support the LDAP service and correlating the attack datasets obtained from honeypots deployed by the Honeynet Project community. We observe a total of 39,388 malicious events targeting the honeypots and discover 273 unique attack sources performing pivot attacks in a period of one month.

OriginalsprogEngelsk
TitelProceedings - 7th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2022
Antal sider6
ForlagIEEE
Publikationsdatomar. 2022
Sider442-447
ISBN (Elektronisk)978-1-6654-9560-8
DOI
StatusUdgivet - mar. 2022
Begivenhed2022 IEEE European Symposium on Security and Privacy Workshops - Genoa, Italien
Varighed: 6 jun. 202210 jun. 2022

Konference

Konference2022 IEEE European Symposium on Security and Privacy Workshops
Land/OmrådeItalien
ByGenoa
Periode06/06/202210/06/2022
NavnIEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
ISSN2768-0657

Fingeraftryk

Dyk ned i forskningsemnerne om 'Deceptive directories and “vulnerable” logs: a honeypot study of the LDAP and log4j attack landscape'. Sammen danner de et unikt fingeraftryk.

Citationsformater