Back to Search Start Over

Honeypot Method to Lure Attackers Without Holding Crypto-Assets

Authors :
Hironori Uchibori
Katsunari Yoshioka
Kazumasa Omote
Source :
IEEE Access, Vol 12, Pp 16059-16071 (2024)
Publication Year :
2024
Publisher :
IEEE, 2024.

Abstract

In recent years, the convenience and potential use of crypto-assets such as Bitcoin and Ethereum have attracted increasing attention. On the other hand, there have been reports of attacks on the blockchain networks that support crypto-assets in an attempt to steal other users’ assets. In the past, research on attack observation against blockchains has used techniques such as holding real crypto-assets to lure attackers into honeypots or falsifying balances to attackers. However, these methods risk losing crypto-assets to attackers or being exposed as honeypots to attackers. To solve these problems, we propose a new RPC (Remote Procedure Call) honeypot method that returns the wallet address of another party holding a high balance in response to an attacker’s request, thereby luring the attacker without having the real crypto-assets. Our experimental evaluation shows that this method can attract more attackers than the method with zero-balance wallets and can observe more sophisticated attacks. Furthermore, we proposed a risk reduction strategy for crypto-asset theft by applying the idea of our method. In the log analysis process, we devised a new clustering method using the number of times an attacker executes a specific method as a feature. By applying this method, we successfully classified attackers based on their objectives, demonstrating the efficient analysis of vast amounts of log data.

Details

Language :
English
ISSN :
21693536
Volume :
12
Database :
Directory of Open Access Journals
Journal :
IEEE Access
Publication Type :
Academic Journal
Accession number :
edsdoj.2f676f4dac9a4beb9d4c1d597a6b8aeb
Document Type :
article
Full Text :
https://doi.org/10.1109/ACCESS.2024.3357785